Home | Amazing | Today | Tags | Publishers | Years | Search 
The Linux® Kernel Primer: A Top-Down Approach for x86 and PowerPC Architectures
The Linux® Kernel Primer: A Top-Down Approach for x86 and PowerPC Architectures

The Linux® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with...

PHP Programming for Windows
PHP Programming for Windows
PHP Programming for Windows the authoritative guide to developing web applications with PHP on the Microsoft Windows platform. It is the first book of its kind to offer a Windows centric stance on PHP with the intermediate to advanced audience in mind. This book covers PHP from the ground up and benefits both...
LDAP System Administration
LDAP System Administration
If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail,...
The Online Rules of Successful Companies: The Fool-Proof Guide to Building Profits
The Online Rules of Successful Companies: The Fool-Proof Guide to Building Profits
In The Online Rules of Successful Companies: The Fool-Proof Guide to Building Profits, leading Internet entrepreneur Robin "Roblimo" Miller (developer for Slashdot and Freshmeat Web sites) presents systematic rules for building the profitability of your business online, whatever you sell - products,...
Content Management Systems (Tools of the Trade)
Content Management Systems (Tools of the Trade)

This book will guide you through the process of arriving at a content management solution, including the background knowledge you need to know, how to go about getting a solution, implementing the solution, and migrating existing content to it.

This book includes:

  • Three activities of content management: Asset...
MySQL: Essential Skills
MySQL: Essential Skills

Set up a MySQL database on Windows or Linux with help from this step-by-step beginner’s guide. Learn to design and create a database with tables, load data into your tables, and generate basic and advanced reports. You’ll also get details on how to administer, secure, and back up your database, and import data from other...

Inside the Security Mind: Making the Tough Decisions
Inside the Security Mind: Making the Tough Decisions
Organizations today commit ever-increasing resources to information security, but are scarcely more secure than they were four or five years ago! By treating information security like an ordinary technological practice—that is, by throwing money, a handful of the latest technologies, and a lineup of gurus at the problem—they...
Life Matters : Creating a Dynamic Balance of Work, Family, Time & Money
Life Matters : Creating a Dynamic Balance of Work, Family, Time & Money

In their groundbreaking book Life Matters, Roger and Rebecca Merrill affirm that the key is proactively creating a dynamic, synergistic life balance between work, family, time, and money. Many believe that you can either have a balanced life at home or you can be highly productive at work, but you can’t do both. The Merrills...

Visual Basic 2005 in a Nutshell (In a Nutshell)
Visual Basic 2005 in a Nutshell (In a Nutshell)

When Microsoft made Visual Basic into an object-oriented programming language, millions of VB developers resisted the change to the .NET platform. Now, after integrating feedback from their customers and creating Visual Basic 2005, Microsoft finally has the right carrot. Visual Basic 2005 offers the power of the .NET...

Mastering FreeBSD and OpenBSD Security
Mastering FreeBSD and OpenBSD Security

FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main...

Writing Secure Code
Writing Secure Code

Improving security was a major focus while we were developing Windows 2000. At one point, we decided to run an unusual experiment to test the product’s mettle before we released it. We set up a Windows 2000 Web server called “Windows2000test.com,” put it out there, and waited to see what happened. We made no...

Negotiate and Win: Unbeatable Real-World Strategies from the NYPD's Top Negotiator
Negotiate and Win: Unbeatable Real-World Strategies from the NYPD's Top Negotiator

Every day, you participate in negotiations. Whether you’re working out a deal with a client, asking for a raise, discussing a weekly allowance with your child, or planning a weekend with your spouse, your life is filled with this intricate process. In Negotiate and Win, former NYPD hostage negotiator Dominick Misino breaks...

Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy