Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sams Teach Yourself BEA WebLogic Server 7.0 in 21 Days
Sams Teach Yourself BEA WebLogic Server 7.0 in 21 Days

"If you're going to run enterprise Java applications in an n-tier architecture, you're going to need an applications server." -Java Pro Magazine, Fall 2001.

An application server is a crucial component of any serious J2EE application. BEA's WebLogic Server (WLS) is the leading product (34% per BEA), incorporating standard...

Payment Card Industry Data Security Standard Handbook
Payment Card Industry Data Security Standard Handbook

Praise for Payment Card Industry Data Security Standard Handbook

"While providing insightful guidance on a holistic approach to tackling the Dirty Dozen of PCI, this book also teaches the fundamental principles of information security management. The PCI DSS Handbook is a must-read for all levels of...

Implementing the Climate Regime: International Compliance
Implementing the Climate Regime: International Compliance
Unlike most books on climate politics, this volume has a sharp focus on one particular aspect of the global climate regime – the system set up to improve compliance with commitments under the 1997 Kyoto Protocol. The design of a compliance system has been controversial ever since the adoption of the 1992 Framework Convention on Climate...
Expert Oracle Database 11g Administration
Expert Oracle Database 11g Administration
Sam Alapati’s Expert Oracle Database 11g Administration is a comprehensive handbook for Oracle database administrators (DBAs) using the latest release of the Oracle Database (Oracle Database 11g). All key aspects of database administration are covered, including backup and recovery, day–to–day...
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication
Contrasting to classical encryption‚ security may not be the most important
aim for an encryption system for images and videos. Depending on the type
of application‚ other properties (like speed or bitstream compliance after encryption)
might be equally important as well. As an example‚ the terms “soft...
Next Generation SSH2 Implementation: Securing Data in Motion
Next Generation SSH2 Implementation: Securing Data in Motion
The most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book
...
CompTIA Security+ Training Kit (Exam SY0-301) (Microsoft Press Training Kit)
CompTIA Security+ Training Kit (Exam SY0-301) (Microsoft Press Training Kit)

Ace your preparation for the skills measured by CompTIA Security+ Exam SY0-301. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying your knowledge to real-world case scenarios and practice exercises. This guide is designed to help...

Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...
The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)
The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)

In the current fast-paced and constantly changing business environment, it is more important than ever for organizations to be agile, monitor business performance, and meet with increasingly stringent compliance requirements. Written by pioneering consultants and bestselling authors with track records of international success, The...

Microsoft SharePoint 2010 Business Application Blueprints
Microsoft SharePoint 2010 Business Application Blueprints
This book will dive into a diverse set of real-world scenarios to deliver sample business solutions that can serve as the foundation for your own solutions. It draws from the author's extensive experience with SharePoint to leverage the platform's underlying services to provide solutions that can support social...
  
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy