Book picks similar to
Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services by Lee Dryburgh
0000000
computers
general
main
CCNP ROUTE 642-902 Official Certification Guide (Official Cert Guide)
Wendell Odom - 2009
Book annotation not available for this title.Title: CCNP ROUTE 642-902Author: Odom, WendellPublisher: Pearson P T RPublication Date: 2010/02/09Number of Pages: 730Binding Type: HARDCOVERLibrary of Congress: 2009049908
HTML Black Book: The Programmer's Complete HTML Reference Book
Steven Holzner - 2000
An immediate and comprehensive answer source, rather than a diffuse tutorial, for serious programmers who want to see difficult material covered in depth without the fluff. Discusses XML, dynamic HTML, JavaScript, Java, and Perl CGI programming to create a full Web site programming package. Written by the author of several successful titles published by The Coriolis Group.
The Definitive ANTLR 4 Reference
Terence Parr - 2012
Whether it's a data format like JSON, a network protocol like SMTP, a server configuration file for Apache, a PostScript/PDF file, or a simple spreadsheet macro language--ANTLR v4 and this book will demystify the process. ANTLR v4 has been rewritten from scratch to make it easier than ever to build parsers and the language applications built on top. This completely rewritten new edition of the bestselling Definitive ANTLR Reference shows you how to take advantage of these new features. Build your own languages with ANTLR v4, using ANTLR's new advanced parsing technology. In this book, you'll learn how ANTLR automatically builds a data structure representing the input (parse tree) and generates code that can walk the tree (visitor). You can use that combination to implement data readers, language interpreters, and translators. You'll start by learning how to identify grammar patterns in language reference manuals and then slowly start building increasingly complex grammars. Next, you'll build applications based upon those grammars by walking the automatically generated parse trees. Then you'll tackle some nasty language problems by parsing files containing more than one language (such as XML, Java, and Javadoc). You'll also see how to take absolute control over parsing by embedding Java actions into the grammar. You'll learn directly from well-known parsing expert Terence Parr, the ANTLR creator and project lead. You'll master ANTLR grammar construction and learn how to build language tools using the built-in parse tree visitor mechanism. The book teaches using real-world examples and shows you how to use ANTLR to build such things as a data file reader, a JSON to XML translator, an R parser, and a Java class->interface extractor. This book is your ticket to becoming a parsing guru!What You Need: ANTLR 4.0 and above. Java development tools. Ant build system optional (needed for building ANTLR from source)
All-New Amazon Fire TV Stick User Guide - Newbie to Expert in 1 Hour!
Tom Edwards - 2014
From the Number 1 Best Selling authors in Computers and Technology, this clear and concise guide will show you how to get the very best from your new Amazon Fire TV Streaming Stick Media Player. Step by step instructions will take you from newbie to expert in just one hour! About the Authors: Tom and Jenna Edwards are the Amazon Tech authors behind the Number 1 Best-selling e-books 250+ Best Kindle Fire HD Apps for the New Kindle Fire Owner and Kindle Fire HDX User Guide: Newbie to Expert in 2 Hours!
Windows Hacking 2.0
Ankit Fadia - 2010
Millions of systems around the world run on this operating system. This popularity has led Windows to be quite vulnerable, as crackers have targeted Windows for their attacks more than lesser-used operating systems.Windows Hacking 2.0 throws light on how to tweak the operating system to make the most of all its features, functionality, looks and feel. The comprehensively researched security tips, tricks and hacks covered in this book allow readers to secure Windows better, customize almost all its aspects to suit personal preferences and make it work the extra mile. After reading this book, not only will readers be able to protect their Windows system against the most common vulnerabilities, loopholes and threats, but will also be able to play cool tricks to impress their friends. A fun and light read that will also make the reader more aware of Windows-related security issues and practices.Want to improve the security of your Windows system? Want to customize the look and feel of your Windows system? Want to control all aspects and features of your Windows System? Want to play harmless pranks on your friends and trick them? Windows Hacking 2.0 will ensure that even you can hack!
Money & Montana 2
Chrissy J - 2015
Despite all the drama, their relationship conquered all. Just when things seem calm, Victoria drops a bomb on Money that once again threatens to end their relationship. Will Money mess up everything they worked so hard to hold on to? Montana unable to deal with everything that's going on starts letting Bonnie step in more and more. Will she do more harm then help? Or will a blast from the past finally push Montana completely over the edge and allow Bonnie to take over completely?
Not Too Young To Kill (The Assassin's Gift #1)
Ian C.P. Irvine - 2021
Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic
Mike Girvin - 2013
Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.
LDAP System Administration
Gerald Carter - 2003
That's what LDAP System Administration is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately see the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux(R) distributions and Mac OS(R) X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses:Configuration and access controlDistributed directories; replication and referralUsing OpenLDAP to replace NISUsing OpenLDAP to manage email configurationsUsing LDAP for abstraction with FTP and HTTP servers, Samba, and RadiusInteroperating with different LDAP servers, including Active DirectoryProgramming using Net:: LDAPIf you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.
Operating System Concepts Essentials
Abraham Silberschatz - 2010
This book covers the core concepts of operating systems without any unnecessary jargon or text. The authors put you on your way to mastering the fundamental concepts of operating systems while you also prepare for today's emerging developments.Covers the core concepts of operating systems Bypasses unnecessary and wordy text or jargon Encourages you to take your operating system knowledge to the next level Prepares you for today's emerging developments in the field of operating systems Operating Systems Concepts Essentials is a soup-to-nuts guide for all things involving operating systems!
8 Things We Hate About IT: How to Move Beyond the Frustrations to Form a New Partnership with IT
Susan Cramm - 2010
Instead, you get endless rules and regulations, not to mention processes, projects, and technologies that deliver too little, too late, for too much. It's frustrating!How to build a relationship that puts you firmly in control and produces the business results you need? In The 8 Things We Hate About IT, Susan Cramm provides the answers.Start by understanding differences between operational and IT managers - in backgrounds, personality, pressures, and incentives. Cramm explains how differences prevent operational managers and IT from communicating what, why, and how they do what they do.Citing case studies and stories, the author then presents practical strategies for overcoming the difficulty. These include seeing things from your IT partners' perspective, developing a single version of 'truth,' and assuming accountability for IT just as you've done for management of your firm's financial and human resources.Brutally honest, provocative, and filled with sound advice, this book reveals that the key to solving the IT problem is decidedly un-IT: it's a deeper understanding of human behavior, including how to apply your leadership skills to the world of IT.
How a Foreign Chocolate won Indian Hearts: The Cadbury Story (Rupa Quick Reads)
Anisha Motwani - 2017
The remarkable story of the brand that was able to pull off the near-impossible challenge of integrating itself into the food habits of a nation strongly habituated to eating indigenous sweets is recounted here. It is a behind-the-scenes look at the Cadbury Dairy Milk journey in India over the last six decades.
Hacking Linux Exposed: Linux Security Secrets & Solutions
Brian Hatch - 2001
Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie - 2020
Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties
Kindle Fire HDX Tips, Tricks and Traps: A How-To Tutorial for the Kindle Fire HDX
Edward C. Jones - 2013
Do you want to get the most out of your new Kindle Fire HDX? If you are looking for a top-notch tutorial at a reasonable cost, you've come to the right place! Here is the book that will teach you 100% of what you need to know.
Kindle Fire HDX Tips, Tricks, and Traps: A How-To Tutorial for the Kindle Fire HDX
is your detailed guide to getting the maximum benefit from your Kindle Fire HDX.In this comprehensive guide, you'll learn tips (ways to effectively use your Kindle Fire), tricks (ways to improve the operation of your Kindle Fire), and traps (things to avoid to prevent problems while using your Kindle Fire). You will learn-• How to get around within the user interface, the home screen, and the carousel more efficiently• How to make your Kindle Fire HDX your own, customizing its display and operation for fastest and easiest use• How to use features that are new to the HDX line, including Google or Outlook Calendar and Contacts synchronization, Microsoft Exchange corporate e-mail support, and Amazon’s ‘Mayday’ online technical support• How to use the built-in cameras (front-facing in the 7-inch model, front-and-rear facing in the 8.9-inch model) to take photos and videos• How to setup the security options to protect your account information• How you can provide a safe environment for children using parental controls and Kindle FreeTime• How you can move your iTunes or other music library to your Kindle Fire HDX• How you can download YouTube videos to your Kindle Fire HDX• Suggested apps that no Kindle Fire owner should be withoutYou will learn all of the above and more, with
Kindle Fire Tips, Tricks, and Traps: A How-To Tutorial for the Kindle Fire HDX
as a part of your library. With this book, you will learn 100% of what you need to know to get the most out of your new Kindle Fire HDX!
Kindle Fire HDX Tips, Tricks, and Traps: A How-To Tutorial for the Kindle Fire HDX
comes from the pen of Edward Jones, the principal technology writer behind the "Get-it-Done" series of computer books. Jones is an experienced computer and technology writer, database applications development analyst, consultant, and trainer who understands the issues faced by people dealing with technology, day in and day out. His career spans years of technology training, database development, and consulting services for major law firms and government agencies in the Washington, DC area, and he currently resides in Charlotte, NC where he is concentrating on providing publications to the rapidly growing digital marketplace. Jones is also a best-selling author whose printed titles have sold over one million copies, and he has served as a technical editor on numerous computer books.