eBooks-it.org Logo
eBooks-IT.org Inner Image

OReilly eBooks Page 69

Download free OReilly eBooks Page 69

Network Security Hacks

Network Security Hacks Image
2nd Edition
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information ...

Ethernet Switches

Ethernet Switches Image
If you're ready to build a large network system, this handy excerpt from Ethernet: The Definitive Guide, Second Edition gets you up to speed on a basic building block: Ethernet switches. Whether you're working on an enterprise or campus network, data center, or Internet service provider network, you'll learn how Ethernet switches function and how they're used in network designs. This brief tutorial also provides an overview of the most important features found in switches, from the basics to more advanced features found in higher-cost and specialized switches. Get an overview of basic switch operation, the spanning tree protocol, and switch performance issues Learn about switch management and some of the most widely used switch features Discover how ...

JavaScript Testing with Jasmine

JavaScript Behavior-Driven Development
JavaScript Testing with Jasmine Image
Get a concise introduction to Jasmine, the popular behavior-driven testing framework for JavaScript. This practical guide shows you how to write unit tests with Jasmine that automatically check for bugs in your application. Learn how to write specifications for individual components, and then use those specs to test the code you write. Throughout the book, author Evan Hahn focuses primarily on methods for testing browser-based JavaScript applications, but you'll also discover how to use Jasmine with CoffeeScript, Node.js, Ruby on Rails, and Ruby without Rails. You won't find a more in-depth source for Jasmine anywhere. Get an overview of both test-driven and behavior-driven development Write useful specs by determining what you need to testand what y...

Windows 8 Hacks

Windows 8 Hacks Image
Windows 8 is quite different than previous Microsoft operating systems, but it's still eminently hackable. With this book, you'll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that's just the beginning. You'll find more than 100 standalone hacks on performance, multimedia, networking, the cloud, security, email, hardware, and more. Not only will you learn how to use each hack, you'll also discover why it works. Add folders and other objects to the Start screen Run other Windows versions inside Windows 8 Juice up performance and track down bottlenecks Use the SkyDrive cloud service to sync your files everywhere Speed up web browsing and ...

Hackers

Heroes of the Computer Revolution - 25th Anniversary Edition
Hackers Image
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers. Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a se...



2007 - 2017 © eBooks-IT.org