Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Cheat at Managing Microsoft Operations Manager 2005
How to Cheat at Managing Microsoft Operations Manager 2005
How to Cheat at Managing Microsoft Operations Manager 2005 is written for
system administrators and systems engineers who are responsible for the upkeep
and administration of IT environments, from a two server environment to a
large enterprise.This book will is a must-read for anyone looking at implementing
an enterprise
...
Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook

Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand....

Chef Infrastructure Automation Cookbook
Chef Infrastructure Automation Cookbook

Irrespective of whether you're a systems administrator or a developer, if you're sick and tired of repetitive manual work and not knowing whether you may dare to reboot your server, it's time for you to get your infrastructure automated.

Chef Infrastructure Automation Cookbook has all the required recipes to configure,...

Hands-on Kubernetes on Azure: Use Azure Kubernetes Service to automate management, scaling, and deployment of containerized applications, 3rd Edition
Hands-on Kubernetes on Azure: Use Azure Kubernetes Service to automate management, scaling, and deployment of containerized applications, 3rd Edition

Understand the fundamentals of Kubernetes deployment on Azure with a learn-by-doing approach

Key Features

  • Get to grips with the fundamentals of containers and Kubernetes
  • Deploy containerized applications using the Kubernetes platform
  • Learn how you can...
Netware Administration
Netware Administration
NetWare Administration contains information from a consultant's or administrator's viewpoint. There are no other NetWare books like it. The author went right to the meat-the NetWare client starts Chapter 1. This book provides tips, tricks, high-level explanations and Foust's hardcore experience in the field for Novell. He includes information that...
Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
Oracle Business Intelligence 11g R1 Cookbook
Oracle Business Intelligence 11g R1 Cookbook

Here's an opportunity to learn all the key elements of the OBIEE 11g suite by doing tasks rather than just reading. Packed with practical recipes, it empowers you to create complex analytical reports with minimum effort.

Overview

  • Improve the productivity of business intelligence solution to satisfy...
Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) Presents best practices for locking down network...
Configuring and Troubleshooting Windows XP Professional
Configuring and Troubleshooting Windows XP Professional
The thing about Windows XP Professional is, users love it. It has a slick interface and it behaves far more intelligently and predictably than some of its predecessors. The new system of software registration aside, Windows XP surely is the most highly acclaimed Microsoft...
Cisco Routers for the Desperate: Router and Switch Management, the Easy Way
Cisco Routers for the Desperate: Router and Switch Management, the Easy Way

Cisco routers and switches are the cornerstones of many networks. But when things break, repairs can intimidate even the most competent administrator. Luckily, just knowing the "in case of emergency" basics will take you far.

Just like the original, this second edition of the highly acclaimed Cisco Routers for the...

Pro Puppet
Pro Puppet

The lives of system administrators and operations staff often revolve around a series of repetitive tasks: configuring hosts, creating users, and managing applications, daemons, and services. Often these tasks are repeated many times in the life cycle of one host, from building to decommissioning, and as new configuration is added or...

802.11 Wireless Networks: The Definitive Guide, Second Edition
802.11 Wireless Networks: The Definitive Guide, Second Edition

As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you...

unlimited object storage image
Result Page: 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy