Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity with Windows Server 2016: Microsoft 70-742 MCSA Exam Guide: Deploy, configure, and troubleshoot identity services and Group Policy in Windows Server 2016
Identity with Windows Server 2016: Microsoft 70-742 MCSA Exam Guide: Deploy, configure, and troubleshoot identity services and Group Policy in Windows Server 2016

Equip yourself with the most complete and comprehensive preparation experience for Identity with Windows Server 2016: Microsoft 70-742 exam.

Key Features

  • Helps you demonstrate real-world mastery of Windows Server 2016 identity features and functionality and prepare for 70-742
  • ...
CompTIA Network+ Practice Tests: Exam N10-007
CompTIA Network+ Practice Tests: Exam N10-007

A smarter, faster review for the CompTIA Network+ exam N10-007

Expertly authored questions provide comprehensive, concise review of 100% of all CompTIA Network+ exam objectives. This certification validates skills equivalent to nine months of practical networking experience; those earning the Network+ certificate will
...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
Scott Empson is currently the associate chair of the bachelor of applied information systems technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, teaching Cisco® routing, switching, and network design courses in certificate, diploma, and applied degree programs at the post-secondary level. He...
VMware vSphere 6.5 Cookbook - Third Edition: Over 140 task-oriented recipes to install, configure, manage, and orchestrate various VMware vSphere 6.5 components
VMware vSphere 6.5 Cookbook - Third Edition: Over 140 task-oriented recipes to install, configure, manage, and orchestrate various VMware vSphere 6.5 components

Deploy and manage VMware vSphere 6.5 components with ease

Key Features

  • Simplified and to-the-point theory and practical recipes to deploy and manage vSphere 6.5
  • Discover the best ways to deploy stateless and stateful ESXi hosts and upgrade them
  • Storage and...
The Definitive Guide to AdonisJs: Building Node.js Applications with JavaScript
The Definitive Guide to AdonisJs: Building Node.js Applications with JavaScript

Learn everything you need to master the AdonisJs framework, including topics such as interacting with a database, rendering templates, writing asynchronous code, and hosting sites with SSL. Along the way, you’ll see how to build a commerce application, which lists products and allows shoppers to register and purchase those...

XML Problem Design Solution (Programmer to Programmer)
XML Problem Design Solution (Programmer to Programmer)
This nuts-and-bolts guide shows you the power of XML by presenting an enterprise application problem that you'll design a program to solve throughout the book. Each chapter takes one part of the featured project and leads you through the design of its solution. The team of experienced authors gradually walks you through sections of increasing...
Implementing SSL / TLS Using Cryptography and PKI
Implementing SSL / TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or...

An Introduction to IMS(TM) : Your Complete Guide to IBM's Information Management System
An Introduction to IMS(TM) : Your Complete Guide to IBM's Information Management System

The Only Up-to-the-Minute Guide to IMS Version 9--Straight from IBM IMS Experts

  • Introduces IMS, one of the world's premiere software products
  • Thoroughly covers key IMS functions, from security to Java support
  • For both new and experienced IMS...
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

Teach Yourself VISUALLY Excel 2007 (Tech)
Teach Yourself VISUALLY Excel 2007 (Tech)
Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 150 Excel 2007 tasks. Each task-based spread includes easy, visual directions for...
Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy