Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mainframe Basics for Security Professionals: Getting Started with RACF
Mainframe Basics for Security Professionals: Getting Started with RACF
Security—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers...
WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
Highly regarded as the book on the air interface of 3G cellular systems WCDMA for UMTS has again been fully revised and updated. The third edition now covers the key features of 3GPP Release 6 ensuring it remains the leading principal resource in this constantly progressing area.

By providing a deep understanding of the...

Special Edition Using Microsoft Office Excel 2007
Special Edition Using Microsoft Office Excel 2007
We crafted this book to grow with you, providing the reference material you need as you move toward Excel proficiency and use of more advanced features. If you buy only one book on Excel, Special Edition Using Microsoft® Office Excel® 2007 is the book you need.

 

Pro SQL Database for Windows Azure: SQL Server in the Cloud
Pro SQL Database for Windows Azure: SQL Server in the Cloud

Pro SQL Database for Windows Azure, 2nd Edition shows how to create enterprise-level database deployments without the usual investment in datacenter and other infrastructure. Take advantage instead of Microsoft’s worldwide backbone for cloud computing that delivers all the power of SQL Server in the form of the cloud-based...

Broadband Network Architectures: Designing and Deploying Triple-Play Services
Broadband Network Architectures: Designing and Deploying Triple-Play Services
“Network professionals who are looking to deploy triple-play service provider networks will find this book a useful tool.”

–Michael Newbery, IP Architect, TelstraClear Limited

 

“This book provides a wealth of information on current and...

Layer 2 VPN Architectures (Networking Technology)
Layer 2 VPN Architectures (Networking Technology)

Master the world of Layer 2 VPNs to provide enhanced services and enjoy productivity gains

  • Learn about Layer 2 Virtual Private Networks (VPNs)

  • Reduce costs and extend the reach of your services by unifying your network architecture

    ...
Getting a Business Loan: Financing Your Main Street Business
Getting a Business Loan: Financing Your Main Street Business

Every day,  Main Street businesses wrestle with the challenge of finding the cash to finance growth or use as working capital. The local banker often wants a credit score of 720, three or more years in business, and a fat savings account. No wonder local bankers approve only 10% of loan applications.

Getting a
...

Optical Burst Switched Networks
Optical Burst Switched Networks

Next-generation high-speed Internet backbone networks will be required to support a broad range of emerging applications which may not only require significant bandwidth, but may also have strict quality of service (QoS) requirements. Furthermore, the traffic from such applications are expected to be highly bursty in nature. For such traffic,...

Search-Based Applications: At the Confluence of Search and Database Technologies
Search-Based Applications: At the Confluence of Search and Database Technologies

What will data management technologies look like in ten years? While the future's difficult to predict, this book provides students, researchers and professionals alike with a brief and engaging look at one prescient trend: the convergence of search and database technologies. This convergence has given rise to a new breed of...

MPLS VPN Security
MPLS VPN Security
A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and...
Managing Cisco Network Security
Managing Cisco Network Security
Providing good internetwork security and remaining current on new
hardware and software products is a never-ending task. Every network
security manager aims to achieve the best possible security because
the risks are real and the stakes are high. An enterprise must decide
what level of security is required, taking into account
...
CoffeeScript Application Development Cookbook
CoffeeScript Application Development Cookbook

Over 90 hands-on recipes to help you develop engaging applications using CoffeeScript

About This Book

  • Use CoffeeScript to create and test applications and backend services
  • Build applications using popular frameworks, libraries, and platforms
  • Interface with popular services...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy