ОС и сети
The first and last word on the feature-packed new Windows 8 Windows 8 is an exciting new version of Microsoft's flagship operating system and it's packed with exciting new features. From the new Windows 82032s lock screen and the new Internet Explore…
The first and last word on the feature-packed new Windows 8 Windows 8 is an exciting new version of Microsoft's flagship operating system and it's packed with exciting new features. From the new Windows 82032s lock screen and the new Internet Explore…
Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and dis…
Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and dis…
A complete, detailed Windows 10 reference for beginners and power users alike Windows 10 Bible is one of the most thorough references on the market with complete coverage of Windows 10. Whether you're a beginner seeking guidance or a power-user looki…
A complete, detailed Windows 10 reference for beginners and power users alike Windows 10 Bible is one of the most thorough references on the market with complete coverage of Windows 10. Whether you're a beginner seeking guidance or a power-user looki…
Developers will advance their AppleScript skills easily with this guide Part of the Developer Reference series, this book is packed with professional secrets for designing and building automated solutions with AppleScript, the powerful, system-level …
Developers will advance their AppleScript skills easily with this guide Part of the Developer Reference series, this book is packed with professional secrets for designing and building automated solutions with AppleScript, the powerful, system-level …
Get in the game of developing successful apps for the iPad Designing for the iPad presents unique challenges for developers and requires an entirely different mindset of elements to consider when creating apps. Written by a highly successful iPad sof…
Get in the game of developing successful apps for the iPad Designing for the iPad presents unique challenges for developers and requires an entirely different mindset of elements to consider when creating apps. Written by a highly successful iPad sof…
Covering the latest VMware vSphere software, an essential book aimed at solving vSphere performance problems before they happen VMware vSphere is the industry's most widely deployed virtualization solution. However, if you improperly deploy vSphere, …
Covering the latest VMware vSphere software, an essential book aimed at solving vSphere performance problems before they happen VMware vSphere is the industry's most widely deployed virtualization solution. However, if you improperly deploy vSphere, …
Develop applications for Mac OS X with this Developer Reference guide Make a clean transition to programming in Apple environments using the elegant and dynamic programming API Cocoa and this practical guide. Written by aseasoned Mac expert, this boo…
Develop applications for Mac OS X with this Developer Reference guide Make a clean transition to programming in Apple environments using the elegant and dynamic programming API Cocoa and this practical guide. Written by aseasoned Mac expert, this boo…
Ensure that your WAN can handle the latest technologies with this must-have strategy guide If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with…
Ensure that your WAN can handle the latest technologies with this must-have strategy guide If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with…
A compendium of shell scripting recipes that can immediately be used, adjusted, and applied The shell is the primary way of communicating with the Unix and Linux systems, providing a direct way to program by automating simple-to-intermediate tasks. W…
A compendium of shell scripting recipes that can immediately be used, adjusted, and applied The shell is the primary way of communicating with the Unix and Linux systems, providing a direct way to program by automating simple-to-intermediate tasks. W…
Advanced QoS for Multi-Service IP/MPLS Networks is the definitive guide to Quality of Service (QoS), with comprehensive information about its features and benefits. Find a solid theoretical and practical overview of how QoS can be implemented to reac…
Advanced QoS for Multi-Service IP/MPLS Networks is the definitive guide to Quality of Service (QoS), with comprehensive information about its features and benefits. Find a solid theoretical and practical overview of how QoS can be implemented to reac…
Presenting updated coverage of openSUSE 11.0 and SUSE Linux Enterprise Server 11.0, this reference is written by Novell insiders and boasts the most up-to-date information available Topics covered include the openSUSE project, command line programs a…
Presenting updated coverage of openSUSE 11.0 and SUSE Linux Enterprise Server 11.0, this reference is written by Novell insiders and boasts the most up-to-date information available Topics covered include the openSUSE project, command line programs a…
Curious about Linux, the amazing alternative operating system? Not sure which of the zillion different variations is right for you, or how to find out? How wise you are to think of Linux All-In-One Desk Reference For Dummies! Because Linux offers so …
Curious about Linux, the amazing alternative operating system? Not sure which of the zillion different variations is right for you, or how to find out? How wise you are to think of Linux All-In-One Desk Reference For Dummies! Because Linux offers so …
Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corpora…
Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corpora…
This comprehensive guide shows you how to integrate a variety of production tools for the Mac OS X platform into all stages of audio production so that you can create and produce music. From single applications to complete suites, you’ll discover the…
This comprehensive guide shows you how to integrate a variety of production tools for the Mac OS X platform into all stages of audio production so that you can create and produce music. From single applications to complete suites, you’ll discover the…
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover …
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover …
Eight references in one-fully revised to include all the new features and updates to Windows 7 As the #1 operating system in the world, Windows provides the platform upon which all essential computing activities occur. This much-anticiapted version o…
Eight references in one-fully revised to include all the new features and updates to Windows 7 As the #1 operating system in the world, Windows provides the platform upon which all essential computing activities occur. This much-anticiapted version o…
Beginning Linux Programming, Fourth Edition continues its unique approach to teaching UNIX programming in a simple and structured way on the Linux platform. Through the use of detailed and realistic examples, students learn by doing, and are able to …
Beginning Linux Programming, Fourth Edition continues its unique approach to teaching UNIX programming in a simple and structured way on the Linux platform. Through the use of detailed and realistic examples, students learn by doing, and are able to …
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, an…
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, an…
A strategic guide to mastering service provider relationships Well-known business management consultant and Boston Globe columnist Mary Helen Gillespie helps business and IT managers navigate through the confusing technology-driven landscape of servi…
A strategic guide to mastering service provider relationships Well-known business management consultant and Boston Globe columnist Mary Helen Gillespie helps business and IT managers navigate through the confusing technology-driven landscape of servi…
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experienc…
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experienc…