Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field...

MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
Welcome to the MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214. This book provides in-depth and detailed information about the major security services in Microsoft Windows 2000 networks, including securing desktops and servers using Group Policy, configuring and managing...
Microsoft Exchange Server 2013 Inside Out Connectivity, Clients, and UM
Microsoft Exchange Server 2013 Inside Out Connectivity, Clients, and UM

With a focus on connectivity, clients, and unified messaging, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment. Guided by Paul Robichaux, a Microsoft MVP and popular author, you will:

  • Understand how Exchange Server 2013 works with previous...
Building a SharePoint 2016 Home Lab: A How-To Reference on Simulating a Realistic SharePoint Testing Environment
Building a SharePoint 2016 Home Lab: A How-To Reference on Simulating a Realistic SharePoint Testing Environment
This book is a step-by-step guide to building your own SharePoint farm in a home lab setting. Learn how to build a windows domain and then join servers into the domain in order to create your own testing and learning environment. After you get the domain stood up, where you go from there is up to you.  This book will help you learn how...
Implementing SSL / TLS Using Cryptography and PKI
Implementing SSL / TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or...

An Introduction to IMS(TM) : Your Complete Guide to IBM's Information Management System
An Introduction to IMS(TM) : Your Complete Guide to IBM's Information Management System

The Only Up-to-the-Minute Guide to IMS Version 9--Straight from IBM IMS Experts

  • Introduces IMS, one of the world's premiere software products
  • Thoroughly covers key IMS functions, from security to Java support
  • For both new and experienced IMS...
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

Teach Yourself VISUALLY Excel 2007 (Tech)
Teach Yourself VISUALLY Excel 2007 (Tech)
Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 150 Excel 2007 tasks. Each task-based spread includes easy, visual directions for...
Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Microsoft Windows Server Administration Essentials
Microsoft Windows Server Administration Essentials

The core concepts and technologies you need to administer a Windows Server OS

Administering a Windows operating system (OS) can be a difficult topic to grasp, particularly if you are new to the field of IT. This full-color resource serves as an approachable introduction to understanding how to install a server, the various...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

104 Number Theory Problems: From the Training of the USA IMO Team
104 Number Theory Problems: From the Training of the USA IMO Team
This challenging problem book by renowned US Olympiad coaches, mathematics teachers, and researchers develops a multitude of problem-solving skills needed to excel in mathematical contests and research in number theory. Offering inspiration and intellectual delight, the problems throughout the book encourage students to express their ideas,...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy