Home | Amazing | Today | Tags | Publishers | Years | Search 
Virtualization with Microsoft Virtual Server 2005
Virtualization with Microsoft Virtual Server 2005
A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of...
10 Minute Guide to Microsoft(R) Access 2002
10 Minute Guide to Microsoft(R) Access 2002
The 10 Minute Guide to MS Access 2002 quickly explains the most common beginning and intermediate level tasks an Access user would need. This book focuses on the most often used features, covering them in lessons designed to take ten minutes or less to complete. In addition, this guide teaches the user how to use...
MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization (Network Business)
MPLS and Next-Generation Networks: Foundations for NGN and Enterprise Virtualization (Network Business)

Understand the business case for deploying MPLS-based services and solutions

  • Provides network managers and architects a precise MPLS primer

  • Defines MPLS service problems and their associated solutions

  • ...
Juniper Networks  Reference Guide: JUNOS Routing, Configuration, and Architecture
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture

Juniper Networks(R) Reference Guide is the ideal implementation guide to the Juniper Networks(R) family of Internet routers and the network operating system JUNOS(TM). With concise explanations of internetworking theory and detailed examples, this book teaches readers how to configure,...

Critical Testing Processes: Plan, Prepare, Perform, Perfect
Critical Testing Processes: Plan, Prepare, Perform, Perfect

"Rex Black has done it again!...Critical Testing Processes is a book that all software testers will want to read from cover to cover and then retain for frequent reference."

—From the Foreword by Rick Craig, software test manager, author, lecturer, and consultant

In today's...

Absolute Beginner's Guide to Networking, Fourth Edition
Absolute Beginner's Guide to Networking, Fourth Edition

Absolute Beginner's Guide to Networking, Fourth Edition gives readers the ability and understanding necessary to create and administer a network. The book shows the reader how to physically connect computers and other devices to a network and access peripherals such as printers over the...

CCNA for Dummies
CCNA for Dummies
What was that whizzing sound? It was you, passing the CCNA certification exam. After you've covered all of Cisco Systems' exam objectives in CCNA For Dummies, such tasks as following network protocols, routing, and maintaining network security will be new tools to add to your skill set.

First, expect to become familiar with the language of...

Hacking Exposed 5th Edition
Hacking Exposed 5th Edition
“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine

"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine

"For almost any computer book, you can find a...

Tricks of the Microsoft(R) Windows Vista(TM) Masters
Tricks of the Microsoft(R) Windows Vista(TM) Masters
All over the world, Windows gurus have been working overtime to uncover the hottest new Windows Vista tips, tricks, and tweaks. Now, J. Peter Bruzzese has collected all their best discoveries in one place: Tricks of the Microsoft® Windows VistaTM Masters!  Bruzzese has interviewed top Windows professionals,...
E-learning Strategies: How to Get Implementation and Delivery Right First Time
E-learning Strategies: How to Get Implementation and Delivery Right First Time

As more than 900f spending on the Internet comes from brick and mortar companies it is these operations that will form the client base for e-learning. This book shows those companies how to get e-learning implementation right first time. Don Morisson explores and explains the whole implementation continuum - strategy, vendor selection,...

Solaris 9 Security (Networking)
Solaris 9 Security (Networking)
Solaris is one of the most widely used operating systems. One of the main reasons for its popularity is its enhanced security. Solaris 9 protects systems from internal and external security threats by restricting access to system data, authenticating and encrypting interactive sessions with the Solaris operating environment, and supporting protocol...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy