|
|
|
|
| | Firewalls: Jumpstart for Network and Systems AdministratorsSecurity advice for any organization from a consultant with decades of experience
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement... | | |
|
Netware AdministrationNetWare Administration contains information from a consultant's or administrator's viewpoint. There are no other NetWare books like it. The author went right to the meat-the NetWare client starts Chapter 1. This book provides tips, tricks, high-level explanations and Foust's hardcore experience in the field for Novell. He includes information that... | | Managing Systems Migrations and Upgrades: Demystifying the Technology PuzzleManaging Systems Migrations and Upgrades is the perfect book for technology managers who want a rational guide to evaluating the business aspects of various possible technical solutions. Enterprises today are in the middle of the R&D race for technology leadership, with providers who increasingly need to create markets for new technologies... | | Oracle 10g Developing Media Rich ApplicationsIntegrating Multimedia features in databases in one of the most important new applications in the last 20 years
Oracle 10g Developing Media Rich Applications is focused squarely on database administrators and programmers as the foundation of multimedia database applications. With the release of Oracle8 Database in 1997,... |
|
Clustering Windows Server: A Road Map for Enterprise SolutionsDuring the final decade of the twentieth century, Microsoft achieved historic levels of marketing success in the computing business. Microsoft offered an alternative so economically appealing to the computing industry that resistance seemed futile in all but a few cases.
Two questions remain. First, “Is there a solution to the... | | Deploying LINUX on the DesktopCovering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!
Looking at the world of the... | | Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... |
|
OpenVMS Alpha Internals and Data Structures: Memory Management (HP Technologies)OpenVMS Alpha Internals and Data Structures: Memory Management is an update to selected parts of the book OpenVMS AXP Internals and Data Structures Version 1.5 (Digital Press, 1994). This book covers the extensions to the memory management subsystem of OpenVMS Alpha to allow the operating system and applications to access 64 bits of address... | | Designing Storage for Exchange 2007 SP1 (Digital Press Storage Technologies)The more important data storage gets, the more admins need this guide to maximize Microsoft server storage performance and efficiency.
This book will help you understand the new choices and possibilities available in designing your storage environment for Microsoft Exchange Server 2007 SP1. The move of Microsoft Exchange... | | |
|
|
Result Page: 7 6 5 4 3 2 1 |