Home | Amazing | Today | Tags | Publishers | Years | Search 
Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Instant InnoDB
Instant InnoDB

InnoDB, the default storage engine for MySQL, is one of the most robust and commonly used in the world today. It can, however, be initially daunting to learn how to start implementing its features, and it can pose unique problems to the beginner user. This guide is written to address these problems.

"Instant InnoDB"...

Application Administrators Handbook: Installing, Updating and Troubleshooting Software
Application Administrators Handbook: Installing, Updating and Troubleshooting Software

An application administrator installs, updates, optimizes, debugs and otherwise maintains computer applications for an organization. In most cases, these applications have been licensed from a third party, but they may have been developed internally. Examples of application types include enterprise resource planning (ERP), customer resource...

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking...

Vmware Vcloud Security
Vmware Vcloud Security

Welcome to VMware vCloud Security. In this book, you will learn how to mitigate  the security threats on a private cloud running VMware vCloud Director. This  book will enable the reader with the knowledge, skills, and abilities to build a  highly secured private cloud running VMware vCloud. We will also look at a ...

Security Information and Event Management (SIEM) Implementation (Network Pro Library)
Security Information and Event Management (SIEM) Implementation (Network Pro Library)

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify,...

Citrix® XenMobile™ Mobile Device Management
Citrix® XenMobile™ Mobile Device Management

Get up to speed with mobile device management with this fantastic, fully illustrated guide to XenMobile. From security to package deployment, it's an essential companion for the current trend of BYOD and corporate mobile devices.

Overview

  • Deploy and manage the complete XenMobile solution
  • ...
Green Electronics Manufacturing: Creating Environmental Sensible Products
Green Electronics Manufacturing: Creating Environmental Sensible Products

Going "green" is becoming a major component of the mission for electronics manufacturers worldwide. While this goal seems simplistic, it poses daunting dilemmas. Yet, to compete effectively in the global economy, manufacturers must take the initiative to drive this crucial movement. Green Electronics Manufacturing: Creating...

Mastering Adobe Captivate 7
Mastering Adobe Captivate 7

Bring a new level of interactivity and sophistication to your e-learning content with the user-friendly features of Adobe Captivate. This practical tutorial will teach you everything from automatic recording to advanced tips and tricks.

Overview

  • Enhance your projects by adding interactivity, animations,...
Pro Exchange 2013 SP1 PowerShell Administration: For Exchange On-Premises and Office 365
Pro Exchange 2013 SP1 PowerShell Administration: For Exchange On-Premises and Office 365

Pro Exchange 2013 SP1 PowerShell Administration is your one-stop resource for both basic and advanced administration of Exchange Server 2013 Service Pack 1 and Exchange Online, Microsoft's best-selling hosted Exchange service.

The industry shift that is currently happening toward ‘the cloud’ is not just...

Male Alopecia: Guide to Successful Management
Male Alopecia: Guide to Successful Management

This monograph provides specialists and primary care physicians who are interested in hair with the practical know-how needed to achieve successful management of male alopecia. Guidance is first provided on the examination of hair loss in men, covering such aspects as clinical examination, the role of trichoscopy and the trichogram,...

A Decision Framework for Integrated Wetland-River Basin Management in a Tropical and Data Scarce Environment: UNESCO-IHE PhD Thesis
A Decision Framework for Integrated Wetland-River Basin Management in a Tropical and Data Scarce Environment: UNESCO-IHE PhD Thesis

Traditionally, wetlands were considered separately from river basin systems. However, nowadays it is becoming common practice to follow an integrated approach in wetland-riverine watershed analysis and management. Such approach requires not only adequate representations of all relevant bio-physical parameters, but also of socio-political and...

Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy