Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Police work deals with human nature, which is always changing and, therefore, constantly poses new challenges for the law enforcement officer. The skills learned in basic police training are just that — basic. Officers must seek continual training to keep up with their criminal counterparts.

The investigation of crimes such as
...
CCNP TSHOOT 642-832 Official Certification Guide
CCNP TSHOOT 642-832 Official Certification Guide

CCNP TSHOOT 642-832 Official Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the CCNP® TSHOOT exam. Senior instructor and best-selling author Kevin Wallace shares preparation hints and test-taking tips, helping you identify areas of weakness and...

Pheromones and Animal Behavior: Chemical Signals and Signatures
Pheromones and Animal Behavior: Chemical Signals and Signatures

Pheromones and other kinds of chemical communication underlie the behavior of all animals. Building on the strengths of the first edition, widely recognized as the leading text in the subject, this is a comprehensive overview of how pheromones work. Extensively revised and expanded to cover advances made over the last ten years, the book...

Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...

Electromagnetic Fields and Waves: Microwave and mmWave Engineering with Generalized Macroscopic Electrodynamics (Textbooks in Telecommunication Engineering)
Electromagnetic Fields and Waves: Microwave and mmWave Engineering with Generalized Macroscopic Electrodynamics (Textbooks in Telecommunication Engineering)
This textbook is intended for a course in electromagnetism for upper undergraduate and graduate students. The main concepts and laws of classical macroscopic electrodynamics and initial information about generalized laws of modern electromagnetics are discussed, explaining some paradoxes of the modern theory. The reader then gets acquainted...
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCNP Data Center Application Centric...
Fast Track Visual Basic .NET
Fast Track Visual Basic .NET
Aimed at the Visual Basic 6 programmer turning to .NET for the first time, Fast Track Visual Basic .NET provides a worthy, fast-paced introduction to the features and APIs working developers need to get started with VB .NET. The salient feature of this book is its compact size and fast-moving yet approachable tutorial to the new version...
Applied Bioinformatics: An Introduction
Applied Bioinformatics: An Introduction

Confused by cryptic computer programs, algorithms and formulae?

In this book, anyone who can operate a PC, standard software and the Internet will learn to understand the biological basis of bioinformatics of the existence as well as the source and availability of bioinformatics software how to apply these tools and interpret results...

Clinton and Japan: The Impact of Revisionism on U.S. Trade Policy
Clinton and Japan: The Impact of Revisionism on U.S. Trade Policy

This book chronicles how a controversial set of policy assumptions about the Japanese economy, known as revisionism, rose to become the basis of the trade policy approach of the Clinton administration. In the context of growing fear over Japan's increasing economic strength, revisionists argued that Japan represented a distinctive form of...

Managing and Optimizing VMware vSphere Deployments
Managing and Optimizing VMware vSphere Deployments

In our experience as consultants, VMware vSphere is the most robust virtualization

solution on the market. The technology is proven and the user base is large.

Although the benefits of virtualization using vSphere are many, proper planning is required to gain these benefits from a vSphere
...
unlimited object storage image
Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy