Home | Amazing | Today | Tags | Publishers | Years | Search 
The Best Damn Windows Server 2008 Book Period, Second Edition
The Best Damn Windows Server 2008 Book Period, Second Edition
In depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.

This book will show you how to
...
Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
MCTS Windows Server 2008 Active Directory Services Study Guide (Exam 70-640) (SET)
MCTS Windows Server 2008 Active Directory Services Study Guide (Exam 70-640) (SET)
The Best Fully Integrated Study System Available for Exam 70-640

With hundreds of practice questions and hands-on exercises, MCTS Configuring Windows Server 2008 Active Directory Study Guide covers what you need to know-and shows you how to prepare-for this challenging exam.

  • 100% complete...
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

...

Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Programming Microsoft Dynamics CRM 4.0 (Pro-Developer)
Programming Microsoft Dynamics CRM 4.0 (Pro-Developer)
Announcing a fully revised second edition of this popular SELF-PACED TRAINING KIT designed to help maximize your performance on 70-536, a core exam for the MCTS and MCPD certifications. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help you assess your skills. It comes packed with the tools and features...
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Windows Vista® Resource Kit, Second Edition
Windows Vista® Resource Kit, Second Edition
Get the definitive reference for deploying, configuring, and supporting Windows Vista with expert insights from Microsoft Most Valuable Professionals (MVPs) and the Windows Vista Team at Microsoft. With additions and updates for SP1, this official Microsoft RESOURCE KIT provides more than 1,700 pages of in-depth technical guidance on automating...
Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
Building Cocoa Applications : A Step by Step Guide
Building Cocoa Applications : A Step by Step Guide
Building Cocoa Applications is an ideal book for serious developers who want to write programs for the Mac OS X using Cocoa. It's a no-nonsense, hands-on text that's filled with examples -- not only simple and self-contained examples of individual Cocoa features, but extended examples of complete applications with enough sophistication...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy