Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft(r) Windows(r) 2000 Server Administrator's Companion
Microsoft(r) Windows(r) 2000 Server Administrator's Companion
MICROSOFT WINDOWS 2000 SERVER ADMINISTRATOR'S COMPANION brings network administrators, systems engineers, and other MIS professionals up to speed on the latest features of Windows 2000 Server, including Active Directory(tm) services, Microsoft Internet Information Server 4.0, the new, integrated console for administrative tools, and more. It's the...
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Eating the IT Elephant: Moving from Greenfield Development to Brownfield
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems

 

For every IT executive, manager, architect, program leader, project leader, and lead analyst

 

...
Forensic Art (Crime Scene Investigations)
Forensic Art (Crime Scene Investigations)

The popularity of crime scene and investigative crime shows on television has come as a surprise to many who work in the field. The main surprise is the concept that crime scene analysts are the true crime solvers, when in truth, it takes dozens of people, doing many different jobs, to solve a crime. Often, the crime scene analyst’s...

Methods of Analysis for Functional Foods and Nutraceuticals, Second Edition
Methods of Analysis for Functional Foods and Nutraceuticals, Second Edition
Functional foods and nutraceuticals encompasses a wide variety of topics ranging from foods with positive health attributes to even dietary supplements. The analysis of this diverse category can create its own set of challenges since sometimes it is not known what is the active agent. Hence an analyst looks for a marker compound,...
Cloud Capacity Management (Expert's Voice in Information Technology)
Cloud Capacity Management (Expert's Voice in Information Technology)

Cloud Capacity Management helps readers in understanding what the cloud, IaaS, PaaS, SaaS are, how they relate to capacity planning and management  and which stakeholders are involved in delivering value in the cloud value chain. It explains the role of capacity management for a creator, aggregator, and consumer of cloud...

Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Do you really understand your online presence? Are you confident that visitors can use your website? Do you know their motivations? How do online communities perceive your company? To innovate and adapt your business quickly, you must know the answers to these questions. Complete Web Monitoring demonstrates how to measure every aspect of your web...
CISSP Exam Cram 2
CISSP Exam Cram 2

Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam Cram 2 is a great way to find out exactly what will be expected of you during...

Web Services Explained: Solutions and Applications for the Real World
Web Services Explained: Solutions and Applications for the Real World

Web services for decision makers: strategic insights and actionable recommendations.

  • How Web services will transform the way software is built, sold, implemented, and managed
  • All you need to know to plan an intelligent Web services strategy
  • Risks and pitfalls in current WebsServices...
Essential Technical Analysis: Tools and Techniques to Spot Market Trends
Essential Technical Analysis: Tools and Techniques to Spot Market Trends

An Introduction to Technical Analysis from One of the Top Names in the Business

"Essential Technical Analysis is a highly valued resource for technical traders. The importance of comprehensive and well-researched market behaviors, indicators, and systems were well expressed graphically with many examples. No technical analyst...

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy