Michael Sucsy | Ariana Greenblatt | Scot Robinson
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fedora Linux Servers with systemd: second edition
Fedora Linux Servers with systemd: second edition

This book is designed as a server reference for Fedora Linux with systemd. This second edition covers Fedora Linux 23. Administration tools are covered as well as the underlying configuration files and system implementations. The emphasis is on what administrators will need to know to perform key networking and server tasks. Topics covered...

Tcl 8.5 Network Programming
Tcl 8.5 Network Programming

Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

BizTalk 2013 EDI for Supply Chain Management: Working with Invoices, Purchase Orders and Related Document Types
BizTalk 2013 EDI for Supply Chain Management: Working with Invoices, Purchase Orders and Related Document Types

Building a successful supply chain processing EDI implementation in BizTalk Server can be complex. Decisions must be made around how to extract and publish data, how to map to the various EDI standards, and how to appropriately batch and deliver data. If architected properly, your BizTalk solution can be highly efficient, simple, and...

Data Engineering: Fuzzy Mathematics in Systems Theory and Data Analysis
Data Engineering: Fuzzy Mathematics in Systems Theory and Data Analysis

Although data engineering is a multi-disciplinary field with applications in control, decision theory, and the emerging hot area of bioinformatics, there are no books on the market that make the subject accessible to non-experts. This book fills the gap in the field, offering a clear, user-friendly introduction to the main theoretical and...

WordPress For Dummies  (Computer/Tech)
WordPress For Dummies (Computer/Tech)
Bloggers love WordPress! If you're ready to start using this free blogging software, WordPress For Dummies, 2nd Edition is just what you and your blog need to make a splash.

Professional blog designer Lisa Sabin-Wilson shows you how to use all the latest upgrades to WordPress and helps you decide whether to use the Wordpress.com hosted...

Linux Administration: A Beginner's Guide, Fifth Edition
Linux Administration: A Beginner's Guide, Fifth Edition
Administering a Linux system isn't much like administering a Windows machine. Though the goals are similar and comparable problems arise under both environments, they each require administrators to adopt a certain way of thinking about processes and data. Linux Administration: A Beginner's Guide helps readers adapt their Windows experience...
Microsoft Visual Basic .NET Programmer's Cookbook
Microsoft Visual Basic .NET Programmer's Cookbook

Filled with the ingredients developers need--code samples, instructions, and solutions to common problems--this book is the logical place for developers to start building projects and learning more about Visual Basic .NET.


Next time you hit the wall with a tough Visual Basic .NET problem, get the code behind the...

Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

Result Page: 13 12 11 10 9 8 7 6 5 4 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy