Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that...

Microsoft  Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant

Delivering immediate answers for the day-to-day administration of ISA Server 2004, this guide offers the focused, straightforward information you need to solve problems and get the job done.

Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of ISA...

From IT Pro to Cloud Pro Microsoft Office 365 and SharePoint Online (IT Best Practices - Microsoft Press)
From IT Pro to Cloud Pro Microsoft Office 365 and SharePoint Online (IT Best Practices - Microsoft Press)

Modernize your IT skills for the new world of cloud computing!

Whether you are an IT administrator, developer, or architect, cloud technologies are transforming your role. This guide brings together the knowledge you need to transition smoothly to Microsoft Office 365 cloud-only and...

Mastering Embedded Linux Programming: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell), 3rd Edition
Mastering Embedded Linux Programming: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell), 3rd Edition

Harness the power of Linux to create versatile and robust embedded solutions

Key Features

  • Learn how to develop and configure robust embedded Linux devices
  • Explore the new features of Linux 5.4 and the Yocto Project 3.1 (Dunfell)
  • Discover different ways to...
Linux Network Administrator's Guide (2nd Edition)
Linux Network Administrator's Guide (2nd Edition)
This book was written to provide a single reference for network administration
in a Linux environment. Beginners and experienced users alike should find the
information they need to cover nearly all important administration activities
required to manage a Linux network configuration. The possible range of
topics to cover is
...
Mastering Windows Server 2016 Hyper-V
Mastering Windows Server 2016 Hyper-V

Build a seamless, flexible, full-service datacenter solution

Microsoft Windows Server 2016 Hyper-V is the IT administrator's guide to this rising datacenter solution. Hyper-V has already surpassed VMWare in datacenter management, identity service for multiple devices, and more; this book shows you how to harness...

Windows Server 2003/2000 Thin Client Solutions
Windows Server 2003/2000 Thin Client Solutions

This book brings together all the insights, knowledge, and step-by-step guidance you need to deliver robust, scalable, and stable server-based computing solutions with Microsoft Windows Terminal Services and Citrix MetaFrame Presentation Server 3.0. Building on two best-selling previous editions, expert consultant Todd W. Mathers...

Mastering phpMyAdmin 3.1 for Effective MySQL Management
Mastering phpMyAdmin 3.1 for Effective MySQL Management

MySQL has gained wide popularity because of its open-source nature, performance, reliability, robustness, and support for various platforms.

phpMyAdmin is a web-based front-end to manage MySQL databases and has been adopted by a number of open-source distributors. It is one of the most widely used open-source applications written...

Pro SQL Server 2008 Administration
Pro SQL Server 2008 Administration

Pro SQL Server 2008 Administration is critical for database administrators seeking in-depth knowledge on administering SQL Server 2008. This book covers the impact of the new features available in SQL Server 2008 specifically targeted for database administrators, along with the tried-and-true advanced techniques required to support and...

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
Windows 2000 Performance Guide
Windows 2000 Performance Guide
The load your users place on your Windows 2000 servers may increase approximately linearly over time, but that's no guarantee that the servers' performance will degrade smoothly and predictably. Rather--and this is the crux of Windows 2000 Performance Guide--a modest increase in workload can often cause a significant, even catastrophic,...
unlimited object storage image
Result Page: 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy