|
|
Windows Server HacksThe tools, or hacks in this book reveal techniques that go well beyond basic management tasks found in most handbooks. Hacks range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, performance, security, and backup and recovery. No matter which Windows Server you use--NT,... | | | | Java Virtual Machine (Java Series)The Java Virtual Machine is the software implementation of a "CPU" designed to run compiled Java code. This includes stand-alone Java applications, as well as "applets" that are downloaded and run in Web browsers such as the NetScape Navigator. This book is a comprehensive programming guide for the Java Virtual Machine (JVM).... |
|
Enterprise Service BusEnterprise Service Bus provides an architectural overview of the ESB, showing how it can bring the task of integration of enterprise applications and services built on J2EE, .NET, C/C++, and other legacy environments into the reach of the everyday IT professional, using an event-driven Service-Oriented... | | ASP.NET in a Nutshell
As a quick reference and tutorial in one, ASP.NET in a Nutshell goes beyond the published documentation to highlight little-known details, stress practical uses for particular features, and provide real-world examples that show how features can be used in a working application. This book covers application and... | | SpamAssassinSys admins can field scores of complaints and spend months testing software suites that turn out to be too aggressive, too passive, or too complicated to setup only to discover that SpamAssassin (SA), the leading open source spam-fighting tool, is free, flexible, powerful, highly-regarded, and remarkably effective. The... |
|
Secure Coding: Principles and PracticesDespite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &... | | Dreamweaver in a NutshellDreamweaver in a Nutshell is a quick desktop reference for both new and experienced Dreamweaver developers. It covers everything from the basics to advanced topics, including navigation bars, image maps, modifications with XML, style sheets, positioning elements, HTML cleanup tools, and ways to extend Dreamweaver... | | Wireless Hacks : 100 Industrial-Strength Tips & ToolsWritten for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field"... |
|
Digital Photography Hacks : 100 Industrial-Strength Tips & ToolsGoing beyond the standard fare of most digital photography books, Digital Photography Hacks shares the knowledge that professional photographers have learned through thousands of shots' worth of experience and years of experimentation. With exquisite, full-color photos throughout, the book presents 100 proven... | | BSD HacksLooking for a unique set of practical tips, tricks, and tools for administrators and power users of BSD systems? From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach to saving time and accomplishing more with fewer resources. If... | | C# & VB.NET Conversion Pocket ReferenceIf you are anything like me, the following is a common scenario: You are writing some code not in the language you traditionally use. Although you know a needed command in your language of choice, the keyword in the language you are using is not even remotely similar, and you can't even think of a word to type... |
|
Result Page: 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 |