Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learn SQL Server Administration in a Month of Lunches: Covers Microsoft SQL Server 2005-2014
Learn SQL Server Administration in a Month of Lunches: Covers Microsoft SQL Server 2005-2014

Summary

Learn SQL Server Administration in a Month of Lunches is the perfect way to get started with SQL Server operations, including maintenance, backup and recovery, high availability, and performance monitoring. In about an hour a day over a month, you'll learn exactly what you can do, and what you...

A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Using Financial Accounting Information: The Alternative to Debits and Credits (Available Titles Aplia)
Using Financial Accounting Information: The Alternative to Debits and Credits (Available Titles Aplia)

USING FINANCIAL ACCOUNTING INFORMATION, 7E, is a non-debit/credit text known for its strong decision-making focus, its incorporation of flagship companies for increased relevance, and the quality of its end of chapter materials. The student-friendly presentation and innovative transaction analysis of the new edition ensures students master...

The Coming Generational Storm: What You Need to Know about America's Economic Future
The Coming Generational Storm: What You Need to Know about America's Economic Future
In 2030, as 77 million baby boomers hobble into old age, walkers will outnumber strollers; there will be twice as many retirees as there are today but only 18 percent more workers. How will America handle this demographic overload? How will Social Security and Medicare function with fewer working taxpayers to support these programs? According to...
The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling (Second Edition)
The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling (Second Edition)
The latest edition of the single most authoritative guide on dimensional modeling for data warehousing!

Dimensional modeling has become the most widely accepted approach for data warehouse design. Here is a complete library of dimensional modeling techniques–– the most comprehensive collection ever written. Greatly expanded to...

Cisco Access Control Security : AAA Administration Services
Cisco Access Control Security : AAA Administration Services

This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.


Hands-on techniques for enabling authentication, authorization, and
...

The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling
The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling

Updated new edition of Ralph Kimball's groundbreaking book on dimensional modeling for data warehousing and business intelligence!

The first edition of Ralph Kimball's The Data Warehouse Toolkit introduced the industry to dimensional modeling, and now his books are considered the most authoritative...

Network Management: Accounting and Performance Strategies
Network Management: Accounting and Performance Strategies
Understanding network performance and effectiveness is now crucial to business success. To ensure user satisfaction, both service providers and enterprise IT teams must provide service-level agreements (SLA) to the users of their networks–and then consistently deliver on those commitments. Now, two of the Cisco® leading network...
Traffic Engineering with MPLS
Traffic Engineering with MPLS

Design, configure, and manage MPLS TE to optimize network performance.

Almost every busy network backbone has some congested links while others remain underutilized. That's because shortest-path routing protocols send traffic down the path that is shortest without considering other network parameters,...

Cisco Network Security Troubleshooting Handbook
Cisco Network Security Troubleshooting Handbook

With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network...

Result Page: 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy