|
|
|
|
|
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking
Portable and precise, this pocket-sized guide delivers ready answers for administering storage, security, and networking features in Windows Server 2012 R2. Zero in on core tasks through quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done - whether at your desk or... | | Auditor's Guide to Information Systems AuditingPraise for Auditor′s Guide to Information Systems Auditing
"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what... | | Installing and Administering Linux, Second EditionAn indispensable working resource for IT professionals moving to Linux-based network systems
More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand... |
|
Linux Network Security (Administrator's Advantage Series)Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security... | | Oracle Essentials: Oracle Database 11gOracle is an enormous system, with myriad technologies, options, and releases. Most users-even experienced developers and database administrators-find it difficult to get a handle on the full scope of the Oracle database. And, as each new Oracle version is released, users find themselves under increasing pressure to learn about a whole range of new... | | Understanding DB2 9 SecurityUnderstanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world... |
|
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 |