Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows 2000 Server System Administration Handbook
Windows 2000 Server System Administration Handbook
In large, readable type, this book describes the most basic network administration tasks as well as new features of Windows 2000 Server and improvements over its predecessor, NT 4.0. Topics include setting up and organizing user accounts; administering file resources, accounts, and printer resources; managing storage data; monitoring event logs;...
Configuring ISA Server 2000
Configuring ISA Server 2000
Today's tools for connectivity are more sophisticated and flexible than ever. As a result, there are more variables involved in setting them up and making them all work together. Mission Critical ISA Server 2000 is designed to provide practical guidance to administrators at businesses that are going online. It teaches readers how to use the...
Administering Cisco QOS for IP Networks
Administering Cisco QOS for IP Networks
Administering Cisco QoS in IP Networks discusses IP Quality of Service (QoS) and how it applies to Enterprise and Service Provider environments. It reviews routing protocols and quality of service mechanisms available today on Cisco network devices (routers, switches, etc.).This guide provides examples and...
Asp Configuration Handbook
Asp Configuration Handbook
The Complete Guide to Migrating an ISP to an ASP ISPs are now faced with a narrowing margin brought on by fierce competition, with little available differentiation in their offerings. In order to reverse this decline in profitability, ISPs have begun to expand services beyond bandwidth and connectivity, by adding remote hosting services such as...
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Building a Cisco Network for WIndows 2000
Building a Cisco Network for WIndows 2000
The release of Windows 2000 Server represents a major advance in the integration of Microsoft's and Cisco's network technologies. Windows 2000 provides an LDAP-compliant directory service called Active Directory. It is accessible over any TCP/IP based internetwork, including the Internet. As such, the Active Directory is the foundation of this...
Configuring Exchange 2000 Server
Configuring Exchange 2000 Server
C.A. Murff MCSE, MCT, CTT, CNA
Who should read this book? Anyone looking for clear, relevant answers on how to best utilize their existing Exchange 2000 environment.

Configuring Exchange Server 2000 is an intermediate to advanced book for both administrators and developers who are actively using
...
Ruby Developer's Guide
Ruby Developer's Guide
"Ruby Developer's Guide" discusses the role of Ruby in real-world applications, including the use of databases and XML, the coding of graphical user interfaces (GUIs) by means of different toolkits, communicating with other languages over SOAP/XML-RPC or sockets, and the programming of concurrent and distributed applications. Using...
Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...

RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Configuring and Troubleshooting Windows XP Professional
Configuring and Troubleshooting Windows XP Professional
The thing about Windows XP Professional is, users love it. It has a slick interface and it behaves far more intelligently and predictably than some of its predecessors. The new system of software registration aside, Windows XP surely is the most highly acclaimed Microsoft...
C# for Java Programmers
C# for Java Programmers
Welcome to C# for Java Programmers. I think you’ll find that this book will be both enjoyable and challenging at the same time. It will cover Microsoft’s new platform called .NET and the exciting new language for the platform called C#. According to Microsoft, the C# language is a simple, modern, object-oriented, and type-safe...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy