Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply...

Mac OS X Panther in 10 Simple Steps or Less
Mac OS X Panther in 10 Simple Steps or Less
If you are looking to make the most of the amazing features of the new Mac OS X Panther and you need a quick and easy understanding of the technology in order to do so, then this book is for you–whether you’re new to Mac OS X Panther or you need a refresher on everything from maximizing Safari™ as a search engine to using the...
Open Source Security Tools: Practical Guide to Security Applications, A
Open Source Security Tools: Practical Guide to Security Applications, A

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical,...

Microsoft  SQL Server(TM) 2005 Administrator's Companion
Microsoft SQL Server(TM) 2005 Administrator's Companion
Get comprehensive information to plan, deploy, administer, and support Microsoft SQL Server 2005 in organizations of any size. With the Microsoft SQL Server 2005 Administrators Companion, you get mission-critical information in a single volumestraight from the experts.

Provides the practical information that database administrators
...
Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Medical Response to Terrorism: Preparedness and Clinical Practice
Medical Response to Terrorism: Preparedness and Clinical Practice
Even two decades ago, few would have imagined that terrorism would be planned and carried out on such an enormous scale as it is today. Terrorist attacks rely on horror and surprise, invoking different times, places, victims, and methods. Their purpose is to cause widespread confusion, fear, injury, and death. They disrupt security,...
MCSE: Windows 2000 Network Infrastructure Design Study Guide
MCSE: Windows 2000 Network Infrastructure Design Study Guide

Here’s the book you need to prepare for Exam 70-221, Designing a Microsoft Windows 2000 Network Infrastructure:

  • Comprehensive and in-depth coverage of every exam objective
  • Practical information on designing a Windows 2000 network infrastructure...
MCITP Developer: Microsoft SQL Server 2005 Data Access Design and Optimization Study Guide: Exam 70-442
MCITP Developer: Microsoft SQL Server 2005 Data Access Design and Optimization Study Guide: Exam 70-442

Get the preparation you need for exam 70-442, PRO: Designing and Optimizing Data Access by Using Microsoft SQL Server 2005, one of two required exams in the Microsoft MCITP: Database Developer certification path. Your essential guide to Microsoft's new SQL Server 2005 certification features practical and in-depth coverage, including:

Beginning Perl (Programmer to Programmer)
Beginning Perl (Programmer to Programmer)

Perl is an immensely popular scripting language that combines the best features of C, key UNIX utilities and a powerful use of regular expressions. It has a wide range of uses beyond simple text processing and is commonly used for web programming - creating and parsing CGI forms, validating HTML syntax and hyperlinks - as well as e-mail and...

Wireless Data Demystified (Mcgraw-Hill Demystified Series)
Wireless Data Demystified (Mcgraw-Hill Demystified Series)
UNDERSTAND WIRELESS DATA COMPLETELY, EASILY WITH WIRELESS DATA DEMYSTIFIED

Wireless subscribers are up, but revenue per subscriber isn’t – and it isn’t going to be unless wireless service providers can provide more than plain-vanilla voice services. The road to successful deployment of data services...

CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)

Here’s the book you need to prepare for Exam 1D0-470, CIW Security Professional. This Study Guide provides:

  • In-depth coverage of official exam objectives
  • Practical information on security concepts and practices
  • Hundreds of...
unlimited object storage image
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy