|
|
|
|
|
| | | | Firewall Policies and VPN ConfigurationsDeploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will... |
|
| | | | JBoss Administration and Development, Second EditionThe primary focus of this book is the presentation of the standard JBoss 3.0.3 architecture components from both the perspective of their configuration and architecture. As a user of a standard JBoss distribution you will be given an understanding of how to configure the standard components.
As a JBoss developer, you will be given a good... |
|
Eye Tracking Methodology: Theory and PracticeDespite the availability of cheap, fast, accurate and usable eye trackers, there is still little information available on how to develop, implement and use these systems. This second edition of Andrew Duchowski’s successful guide to these systems contains significant additional material on the topic and fills this gap in the market with this... | | Thin Film Optical Filters, Third EditionIt is obvious from the details of his career that Angus knows more about optical coatings, both in terms of design and of fabrication, than most of us put together. It is therefore quite expected that I feel free to state that, in my opinion, this book is a necessity, rather on par with having the use of a coating facility, a good coating program,... | | Microsoft Exchange 2013 Cookbook
Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise.
Overview
-
Deploy Microsoft Exchange 2013 in the real world
-
Understand...
|
|
|
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 |