eBooks-it.org Logo
eBooks-IT.org Inner Image

McGraw Hill eBooks Page 9

Download free McGraw Hill eBooks Page 9

Mastering JavaFX 8 Controls

Mastering JavaFX 8 Controls Image
Design and Deploy High-Performance JavaFX Controls Deliver state-of-the-art applications with visually stunning UIs. Mastering JavaFX 8 Controls provides clear instructions, detailed examples, and ready-to-use code samples. Find out how to work with the latest JavaFX APIs, configure UI components, automatically generate FXML, build cutting-edge controls, and effectively apply CSS styling. Troubleshooting, tuning, and deployment are also covered in this Oracle Press guide. Understand the properties of JavaFX 8 controls and APIs Create custom controls, transformations, and layouts Work from JavaFX Scene Graph and Scene Builder Visualize data models using advanced control types Use ListView, TableView, and TreeView APIs Handle audio and video content us...

Ubuntu Server Administration

Ubuntu Server Administration Image
Administer Ubuntu Server in the EnterpriseRealize a dynamic, stable, and secure Ubuntu Server environment with expert guidance, tips, and techniques from a Linux professional. Ubuntu Server Administration covers every facet of system management--from users and file systems to performance tuning and troubleshooting. Learn how to automate installation using Kickstart, set up print and Web servers, configure and secure networks and TCP/IP ports, and implement Linux virtualization. You'll also get details on sharing resources via NFS and Samba, protecting your system, and customizing the Linux kernel.Install Ubuntu Server Edition in a production environmentUse administrative commands, secure with the PolicyKit, and customize permissions with ACLsConfigur...

Hacking Exposed

Network Security Secrets and Solutions
Hacking Exposed Image
6th Edition
The world's bestselling computer security book--fully expanded and updated"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." --From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must think evil' and be attuned to your real risk'...Hacking Expose 6 defines both." --Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset...

Hacking Exposed Computer Forensics

Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics Image
2nd Edition
"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData CorporationThe latest strategies for investigating cyber-crimeIdentify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensi...

Fedora Core 7 & Red Hat Enterprise Linux

The Complete Reference
Fedora Core 7 & Red Hat Enterprise Linux Image
The Definitive Linux Resource--Fully Updated and ExpandedGet full details on the powerful features of Red Hat Enterprise Linux and Fedora 7 from this fully revised, one-stop guide. Linux expert Richard Petersen covers all the bases, from configuring your desktop, customizing your system, and accessing software repositories to handling files and directories, managing devices and servers, and sharing system resources.Inside, you'll get in-depth coverage of Fedora 7's device and network autoconfiguration, IPv6 and .NET support, SE Linux, software repository installs, custom distribution spins, and system administration tools. You'll learn how to deploy sound security measures, configure automatic device detection, set up logical volumes for file managem...



2007 - 2017 © eBooks-IT.org