Cybersecurity Operations Handbook Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity... Managing Microsoft's Remote Installation Services I remember one fateful afternoon when I asked my colleague Michael Iversen whether he’d be interested in writing a book with me. When he had finished laughing, his initial response was that he actually liked the idea. Neither of us had ever written a book before, but for us the idea seemed thrilling.
Agreeing on the subject was...
Oracle Database Programming Using Java and Web Services The traditional division of labor between the database (which only stores and manages SQL and XML data for fast, easy data search and retrieval) and the application server (which runs application or business logic, and presentation logic) is obsolete. Although the books primary focus is on programming the Oracle Database, the concepts and... Data Networks: Routing, Seurity, and Performance Optimization
Data Networks builds on the foundation laid in Kenyon’s first book, High Performance Data Network Design, with expanded coverage of routing, tuning, and troubleshooting. Kenyon provides strategies for overcoming some of the most challenging problems in network design and management. He provides clear, specific solutions for...
Computer Systems Performance Evaluation and Prediction
Computer Systems Performance Evaluation and Prediction bridges the gap from academic to professional analysis of computer performance.
This book makes analytic, simulation and instrumentation-based modeling and performance evaluation of computer systems components understandable to a wide audience of computer systems,...
|Result Page: 7 6 5 4 3 2 1 |