Home | Amazing | Today | Tags | Publishers | Years | Search 
OpenAM
OpenAM

OpenAM is an open source continuation of the OpenSSO project that was taken over, and later scrapped, by Oracle. OpenAM is the only commercial-grade, feature-rich web application that provides SSO solutions. It has a variety of features and a powerful Single Sign-On (SSO) capability, but the implementation can be tricky, and the unorganized...

Business Process Mapping: Improving Customer Satisfaction
Business Process Mapping: Improving Customer Satisfaction
Praise For Business Process Mapping: Improving Customer Satisfaction, Second Edition

"A must-read for anyone performing business process mapping! This treasure shares step-by-stepapproaches and critical success factors, based on years of practical, customer-focused experience.A real winner!"
в
...

Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic...
Applied Oracle Security: Developing Secure Database and Middleware Environments
Applied Oracle Security: Developing Secure Database and Middleware Environments

Cutting-edge techniques from leading Oracle security experts

This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database...

Professional SharePoint 2007 Records Management Development: Managing Official Records with Microsoft Office SharePoint Server 2007
Professional SharePoint 2007 Records Management Development: Managing Official Records with Microsoft Office SharePoint Server 2007

Unique guide to records management methodologies for Microsoft Office SharePoint Server 2007

There may be books available on how to develop solutions for Microsoft Office SharePoint Server 2007, but this is the first book to provide step-by-step guidance for designing and building records management solutions on the SharePoint platform....

Excel 2010 For Dummies Quick Reference
Excel 2010 For Dummies Quick Reference

Find the answers to your most important Excel questions with this reference

John Walkenbach’s name is synonymous with excellence in computer books that decipher complex technical topics. Known as "Mr. Spreadsheet," Walkenbach—along with Excel expert Colin Banfield—answers your most common and...

Pro SQL Server 2008 Policy-Based Management
Pro SQL Server 2008 Policy-Based Management

Pro SQL Server 2008 Policy-Based Management is critical for database administrators seeking in-depth knowledge on administering servers using the new policy-based management features introduced in SQL Server 2008. This book will cover everything from a basic introduction to policy-based management to creating your own custom policies...

Unauthorised Access: Physical Penetration Testing For IT Security Teams
Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...

Openfire Administration: A practical step-by-step guide to rolling out a secure Instant Messaging service over your network
Openfire Administration: A practical step-by-step guide to rolling out a secure Instant Messaging service over your network

Openfire is a free, open-source and full featured Jabber-based Instant Messaging server.

This book is a guide to setting up Openfire, tweaking it, and customizing it to build a secure and feature-rich alternative to consumer IM networks. The features covered include details about setting up the server, adding and handling users and...

Writing a Report: How to Prepare, Write and Present Really Effective Reports
Writing a Report: How to Prepare, Write and Present Really Effective Reports

Report writing can be described as a career skill. Not only is it a task that forms part of an increasing number of business jobs, but also it can make a huge difference to how you are perceived and even how well you get on in your career. Today, good communication skills and theability to write effective reports are essential competencies...

Microsoft Forefront Identity Manager 2010 R2 Handbook
Microsoft Forefront Identity Manager 2010 R2 Handbook
Microsoft's Forefront Identity Manager simplifies enterprise Identity Management for end users by automating admin tasks and integrating the infrastructure of an enterprise with strong authentication systems.

The Microsoft Forefront Identity Manager 2010 R2 Handbook is an in-depth guide to Identity Management.
...
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy