Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows NT Backup & Restore
Windows NT Backup & Restore

As the number of mission-critical applications running on Windows NT grows, it becomes vital for administrators to safeguard data from loss or corruption. While a myriad of Microsoft and third-party software and hardware solutions are currently available (and more are becoming available every day), there is very little guidance for...

Think Smart - Act Smart: Avoiding The Business Mistakes That Even Intelligent People Make
Think Smart - Act Smart: Avoiding The Business Mistakes That Even Intelligent People Make
If this book had a hero, it would probably be Sir Isaac Newton. Today there is an entire branch of physics known as Newtonian. Newton made great discoveries in mathematics, optics, and physics, and his formulation of the lawof gravitation is still in use today. By the age of 23, he had developed a workable version of calculus,...
Securing Weblogic Server 12c
Securing Weblogic Server 12c

Learn to develop, administer, and troubleshoot your WebLogic Server

  • Discover Authentication providers
  • Configure security for WebLogic applications and develop your own security providers
  • Step by step guide to administer and configure WebLogic security providers
  • Quick guide to...
Ansible: Up and Running
Ansible: Up and Running

Among the many configuration management tools available, Ansible has some distinct advantages—it’s minimal in nature, you don’t need to install anything on your nodes, and it has an easy learning curve. This practical guide shows you how to be productive with this tool quickly, whether you’re a developer...

Getting Started with Windows Server Security
Getting Started with Windows Server Security

Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

About This Book

  • Learn how to identify and mitigate security risks in your Microsoft Server infrastructure
  • Develop a proactive approach to common security threats to prevent sensitive data...
Troubleshooting PostgreSQL
Troubleshooting PostgreSQL

Intercept problems and challenges typically faced by PostgreSQL database administrators with the best troubleshooting techniques

About This Book

  • Detect and solve performance, indexing, and fuzzy matches problems and more in an effective way
  • Tune PostgreSQL databases and remove bottlenecks...
Linux and Solaris Recipes for Oracle DBAs
Linux and Solaris Recipes for Oracle DBAs

Linux and Solaris Recipes for Oracle DBAs, 2nd Edition is an example–based book on managing Oracle Database under Linux and Solaris. The book is written for database administrators who need to get work done and lack the luxury of curling up fireside with a stack of operating-system documentation. What this book provides...

Microsoft Exchange Server PowerShell Cookbook - Third Edition
Microsoft Exchange Server PowerShell Cookbook - Third Edition

Over 120 recipes to help you manage and administrate Exchange Server 2013 Service Pack 1 with PowerShell 5

About This Book

  • Explore the new features and capabilities of PowerShell 5 and its integration with Exchange Server 2013
  • Learn how to write scripts and functions, schedule scripts to...
Continuous Delivery and DevOps: A Quickstart Guide - Second Edition
Continuous Delivery and DevOps: A Quickstart Guide - Second Edition

Deliver quality software regularly and painlessly by adopting CD and DevOps

About This Book

  • Use DevOps and the Continuous Delivery approach to identify the underlying problems that can stifle the delivery of quality software and overcome them
  • Learn how Continuous Delivery and DevOps work...
Mastering Citrix XenServer
Mastering Citrix XenServer

Design and implement highly optimized virtualization solutions using Citrix® XenServer® 6.2

About This Book

  • Master mission-critical aspects of virtualization to develop, deploy, and administer virtual infrastructures
  • Integrate Citrix XenServer with OpenStack and CloudStack to...
Hyper-V Security
Hyper-V Security

If you are an administrator with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory, but you're looking for more information on hardening your Hyper-V deployment, this book is for you. If you've already got a functional Hyper-V environment, you will have no trouble reading this book and following its...

Protecting Networks with SATAN
Protecting Networks with SATAN

SATAN (Security Administrator's Tool for Analyzing Networks) is a powerful aid for system administrators. It performs "security audits," scanning host computers for security vulnerabilities caused by erroneous configurations or by known software errors in frequently used programs. SATAN is a particularly interesting piece of...

Result Page: 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy