Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Securing and Controlling Cisco Routers
Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting...

Formal Correctness of Security Protocols (Information Security and Cryptography)
Formal Correctness of Security Protocols (Information Security and Cryptography)
Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.

The author investigates proofs of correctness of realistic security protocols in...

Quality Engineering Handbook, Second Edition, Revised and Expanded (Quality and Reliability)
Quality Engineering Handbook, Second Edition, Revised and Expanded (Quality and Reliability)
…a launching pad for those interested in mastering the field of quality engineering.
Journal of Quality Technology

…focused toward the goals of quality engineering, quality control, and continuous improvement…a fine effort.

Written by the one of the foremost authorities on the subject,
...
Governance of the Extended Enterprise: Bridging Business and IT Strategies
Governance of the Extended Enterprise: Bridging Business and IT Strategies
Discover how to implement an effective IT governance structure for the long-term success of an extended enterprise

IT is no longer an enabler of corporate strategy, it is now the key element of corporate strategy. Governance of the Extended Enterprise explores how some of the world's most successful enterprises have integrated information...

Java 2 Certification Training Guide
Java 2 Certification Training Guide
With full coverage of the three latest Sun Java certification exams, Java 2 Certification Training Guide provides an excellent resource for any Java programmer prepping for these tests.

The best thing about this book is its insider-track perspective on three Sun exams. This book concentrates on the Programmer exam (which comprises...

Practical DevOps
Practical DevOps

Key Features

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • Improve your organization's performance to ensure smooth production of software and services
  • Deploy top-quality software and...
Information Security Management Handbook, Sixth Edition (Isc2 Press)
Information Security Management Handbook, Sixth Edition (Isc2 Press)
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion...
Protect Your Information With Intrusion Detection (Power)
Protect Your Information With Intrusion Detection (Power)

Protect Your Information with Intrusion Detection contains a detailed overview of the new technology in information protection--intrusion detection. This is a comprehensive handbook introducing the reader to the problem of intrusion detection, exploring the main concepts and principals of intrusion detection technology, and giving an...

Information Security For The Little Guy
Information Security For The Little Guy
Being secure in an insecure world is a tough nut to crack. There are so many ways that our personal information can be stolen and duplicated today it is a very serious situation and should be taken very seriously.

From our surfing the Internet to just the simplicity of speaking on a cell phone to our friends can
...
Information Security Management Handbook, Fifth Edition
Information Security Management Handbook, Fifth Edition

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated...

MCSE in a Nutshell: The Windows 2000 Exams
MCSE in a Nutshell: The Windows 2000 Exams
Microsoft's MCSE (Microsoft Certified Systems Engineer) candidates in the Windows 2000 track are required to pass five core exams and two elective exams. These exams are designed to provide a valid and reliable measure of competency for experienced IT professionals working in the typically complex computing environment of medium to large...
unlimited object storage image
Result Page: 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy