Home | Amazing | Today | Tags | Publishers | Years | Search 
Repairing and Upgrading Your PC
Repairing and Upgrading Your PC

Most computer users think that fiddling with the insides of their PC is taboo. They fear that by removing the screws that hold the case on, they're crossing into forbidden territory. And even for those who know they can open the box and fix or upgrade their PC, analysis paralysis often stops them in their tracks:
...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

UNIX Application Migration Guide (Patterns & Practices)
UNIX Application Migration Guide (Patterns & Practices)
This book contains guidelines and best practices for porting existing UNIX applications to Microsoft Windows, and covers planning and implementation issues and reviews the different ways in which such a migration can be done.

This guide is designed to give you the best information available about the issues that you are likely to face if
...
Implementing and Integrating Product Data Management and Software Configuration Management
Implementing and Integrating Product Data Management and Software Configuration Management
This text shows how the integration of PDM and SCM can help organizations quickly and efficiently develop new products and efficiently maintain and update existing products.

Because today’s products rely on tightly integrated hardware and software components, system and software engineers need to have an understanding of both...

Practical Unix & Internet Security, 3rd Edition
Practical Unix & Internet Security, 3rd Edition
This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication...
UNIX Fault Management: A Guide for System Administrators
UNIX Fault Management: A Guide for System Administrators

If you're responsible for maintaining the integrity and availability of a mission-critical UNIX system, then you need UNIX Fault Management: A Guide for System Administrators, the first book that brings together all of the monitoring and fault management information. Expert UNIX system management...

Unit Test Frameworks
Unit Test Frameworks
This is the only book to explore unit testing as a language-independent, standalone development methodology. It covers the theory and methodology of unit test frameworks, offers instruction in unit test development, provides useful code examples in both Java and C++, and details the most commonly used frameworks from the XUnit family,...
qmail
qmail
qmail concentrates on common tasks like moving a sendmail setup to qmail, or setting up a "POP toaster," a system that provides mail service to a large number of users on other computers sending and retrieving mail remotely. The book fills crucial gaps in existing documentation, detailing exactly what the core qmail software does.
...
The Practice of Network Security: Deployment Strategies for Production Environments
The Practice of Network Security: Deployment Strategies for Production Environments
This book shows you how to secure an enterprise network in the real world-when you're on the front lines, constantly under attack, and you don't always get the support you need. Symantec security engineer and former UUNet network architect Allan Liska addresses every facet of network security, from risk profiling through access control, Web/email...
Networking Concepts and Technology : A Designer's Resource (Sun Bluprints)
Networking Concepts and Technology : A Designer's Resource (Sun Bluprints)
This book is a resource for network architects who must create solutions for emerging network environments in enterprise data centers. You'll find information on how to leverage Sun(TM) Open Network Environment (Sun ONE) technologies to create Services on Demand solutions, as well as technical details about the networking internals. The information...
Aspect-Oriented Software Development with Use Cases
Aspect-Oriented Software Development with Use Cases

Aspect-oriented programming (AOP) is a revolutionary new way to think about software engineering. AOP was introduced to address crosscutting concerns such as security, logging, persistence, debugging, tracing, distribution, performance monitoring, and exception handling in a more effective manner. Unlike conventional development...

Enterprise SOA : Service-Oriented Architecture Best Practices (The Coad Series)
Enterprise SOA : Service-Oriented Architecture Best Practices (The Coad Series)

Enterprise SOA presents a complete roadmap for leveraging the principles of Service-Oriented Architectures to reduce cost and risk, improve efficiency and agility, and liberate your organization from the vagaries of changing technology.

  • Benefit from the lessons of four enterprise-level...

Result Page: 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy