Fantastique | Karin Krog With John Surman - Freestyle (1985) | Are You There God? It's Me, Peter
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Cult of iPod
Cult of iPod
Wired news editor Leander Kahney follows up his bestselling The Cult of Mac with The Cult of iPod, a comprehensive look at how Apple's hit iPod is changing music, culture, and listening behavior. The Cult of iPod includes the exclusive back story of the iPod's development; looks at the many ways iPod's users pay...
Flash: The Future: Pocket PC / DVD / ITV / Video / Game Consoles / Wireless
Flash: The Future: Pocket PC / DVD / ITV / Video / Game Consoles / Wireless
Design simple Flash applications, business applications, and games for pocket PCs; use eVB and eVC to deliver these applications on the PPC without the limitations of Pocket Internet Explorer; create Flash content for playback on DVD; and use Flash to construct interfaces for interactive TV. The CD- ROM includes code and examples from the book plus...
Ruby by Example: Concepts and Code
Ruby by Example: Concepts and Code
There may be no better way to learn how to program than by dissecting real, representative examples written in your language of choice. Ruby by Example analyzes a series of Ruby scripts, examining how the code works, explaining the concepts it illustrates, and showing how to modify it to suit your needs. Baird's examples demonstrate key...
The Book of Visual Studio .NET
The Book of Visual Studio .NET
The Book of Visual Studio .NET surveys each .NET server and related technologies, with a focus on Visual Studio 7 (VS7). Hands-on examples cover building forms, data retrieval, moving to COM+, and implementing web services. Other key issues and solutions include upgrading from Visual Basic, source control services, and remoting.
...
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language...
Ubuntu Linux for Non-Geeks: A Pain-Free, Project-Based, Get-Things-Done Guidebook
Ubuntu Linux for Non-Geeks: A Pain-Free, Project-Based, Get-Things-Done Guidebook

This newbie's guide to Ubuntu lets readers learn by doing. Using immersion-learning techniques favored by language courses, step-by-step projects build upon earlier tutorial concepts, stimulating the brain and increasing the reader's understanding. It also covers all the topics likely to be of interest to an average desktop user, such as...

Linux Made Easy: The Official Guide to Xandros 3 for Everyday Users
Linux Made Easy: The Official Guide to Xandros 3 for Everyday Users
Linux is an operating system, just like Windows or Mac OS. If you're looking at this book, you're probably somewhat of a Linux newbie. Maybe you're a Windows refugee--you just can't take it anymore or you want to stop paying through the nose for software and the latest buggy upgrade. Or you just want to try something new.

Linux Made...

Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. In addition to explaining rootkits and rootkit writing, the book aims to inspire readers to explore the FreeBSD kernel and gain a better understanding of the kernel and the FreeBSD operating system itself. Unlike...
The Book of Nero 7: CD and DVD Burning Made Easy
The Book of Nero 7: CD and DVD Burning Made Easy
Ahead Software's Nero program is the most popular CD and DVD burning software in the world. While it seems like it should be easy to burn CDs and DVDs, doing so can be much more complicated than it appears, and many users reach high frustration levels after burning multiple coasters that don't work.

This simple, task-oriented, step-by-step book...

The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone...
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
It's easy enough to install Wireshark and begin capturing packets off the wire--or from the air. But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then...
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy