Home | Amazing | Today | Tags | Publishers | Years | Search 
ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
Mainframe Basics for Security Professionals: Getting Started with RACF
Mainframe Basics for Security Professionals: Getting Started with RACF
Security—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers...
Oracle Database 11g DBA Handbook (Osborne Oracle Press)
Oracle Database 11g DBA Handbook (Osborne Oracle Press)
The Essential Resource for Oracle DBAs--Fully Updated and Expanded

Manage a flexible, highly available Oracle database with help from the expert information contained in this exclusive Oracle Press guide. Fully revised to cover every new feature and utility, Oracle Database 11g DBA Handbook shows how to perform a new...

Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
Pro Web 2.0 Application Development with GWT (Expert's Voice in Web Development)
Pro Web 2.0 Application Development with GWT (Expert's Voice in Web Development)
This book is for developers who are ready to move beyond small proof–of–concept sample applications and want to look at the issues surrounding a real deployment of GWT. If you want to see what the guts of a full–fledged GWT application look like, this is the book for you.

GWT 1.5 is a game–changing technology, but it...

Security and Quality of Service in Ad Hoc Wireless Networks
Security and Quality of Service in Ad Hoc Wireless Networks
Ensuring secure transmission and good quality of service (QoS) in ad hoc wireless networks are key commercial concerns. Focusing on practical potential solutions, this text covers security and QoS in these networks. Starting with a review of the basic principles of ad hoc wireless networking, coverage progresses to vulnerabilities, and the...
Samba: UNIX and NT Internetworking
Samba: UNIX and NT Internetworking
The target audience for this work includes systems programmers and administrators who are looking for assistance in implementing Samba in new and existing Windows and UNIX environments. A basic overview of both UNIX and Windows system and network architectures is provided to assist those readers whose primary background may be in one or the other...
MCTS Self-Paced Training Kit (Exam 70-642): Configuring Windows Server 2008 Network Infrastructure (PRO-Certification)
MCTS Self-Paced Training Kit (Exam 70-642): Configuring Windows Server 2008 Network Infrastructure (PRO-Certification)
Announcing an all-new Self-Paced Training Kit designed to help maximize your performance on 70-642, the required exam for the new Microsoft® Certified Technology Specialist (MCTS): Windows Server 2008 Networking Infrastructure Configuration certification. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on...
Mastering Network Security
Mastering Network Security
Do you need to secure your network? Here's the book that will help you implement and maintain effective network security, no matter what size your network is or which NOS you're using. Packed with practical advice and indispensable information, this book systematically identifies the threats that your network faces and explains how to eliminate or...
Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
Spring Recipes: A Problem-Solution Approach (Books for Professionals by Professionals)
Spring Recipes: A Problem-Solution Approach (Books for Professionals by Professionals)
Spring addresses most aspects of Java/Java EE application development and offers simple solutions to them. By using Spring, you will be lead to use industry best practices to design and implement your applications. The releases of Spring 2.x have added many improvements and new features to the 1.x versions. Spring Recipes: A...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy