Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing DirectAccess with Windows Server 2016
Implementing DirectAccess with Windows Server 2016

Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. With each new operating system release, new features and capabilities have been included to allow network engineers and security...

Microsoft Exchange Server 2010 Best Practices
Payroll: A Guide to Running an Efficient Department
Payroll: A Guide to Running an Efficient Department
Payroll: A Guide to Running an Efficient Department
is a guide to
improving the payroll department through increasing its efficiency
and compliance. It combines the tasks the payroll department
must do with the most efficient ways available to do them.
With the demands made upon today’s payroll department—to...
Sakai Courseware Management: The Official Guide
Sakai Courseware Management: The Official Guide

This book is the officially endorsed Sakai guide. From setting up and running Sakai for the first time to creatively using its tools, this book delivers everything you need to know.

Written by Alan Berg, Senior developer at the IC and a Sakai fellow and Michael Korcuska, the executive director of the Sakai Foundation, and with...

Security Information and Event Management (SIEM) Implementation (Network Pro Library)
Security Information and Event Management (SIEM) Implementation (Network Pro Library)

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify,...

Advanced Persistent Training: Take Your Security Awareness Program to the Next Level
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book...

The Vest Pocket Guide to Information Technology
The Vest Pocket Guide to Information Technology
The only IT guide you need

You're busy—very busy. You need reliable, practical answers to your IT questions, and you need them now. The Vest Pocket Guide to Information Technology, Second Edition is a handy pocket problem-solver designed to provide you with the quickest route to a solution. Practical, reader-friendly, and thoroughly...

The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web
The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are...

Digital Data Integrity: The Evolution from Passive Protection to Active Management
Digital Data Integrity: The Evolution from Passive Protection to Active Management
How to plan your future strategy for efficient, cost-saving data management

Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly. The ever-increasing amount of data, along with the...

Pro Exchange 2013 SP1 PowerShell Administration: For Exchange On-Premises and Office 365
Pro Exchange 2013 SP1 PowerShell Administration: For Exchange On-Premises and Office 365

Pro Exchange 2013 SP1 PowerShell Administration is your one-stop resource for both basic and advanced administration of Exchange Server 2013 Service Pack 1 and Exchange Online, Microsoft's best-selling hosted Exchange service.

The industry shift that is currently happening toward ‘the cloud’ is not just...

What is Sarbanes-Oxley?
What is Sarbanes-Oxley?

The Sarbanes-Oxley Act is unquestionably important to corporate America. It can also be complex and confusing, for everyone from the employees who must be doubly aware of what they can—and cannot—do to the officers who must take legal responsibility for the actions, errors, and omissions of those employees.

What is...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy