Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

Business Continuity and Disaster Recovery Planning for IT Professionals
Business Continuity and Disaster Recovery Planning for IT Professionals
Increase Your Companys Odds of Surviving a Major Disaster

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia These headlines not only have caught the attention of people around the world, they have had a
...
Mission-Critical Network Planning
Mission-Critical Network Planning
I wrote this book in the aftermath of the terrorist attacks that took place on September
11, 2001. Until then, I was planning to write this book at a much later time. But
the events of that day compelled me to immediately begin this work. As we have
seen, those events have had far-reaching repercussions in the information
...
VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)
VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)

Edward L. Haletky’s Complete, Solutions-Focused Guide to Running ESX Server 3.5, vSphere, and VMware 4.x

 

Extensively updated and revised, this is the definitive real-world guide to planning, deploying, and managing VMware ESX Server 3.5,...

The Culture of Critique: An Evolutionary Analysis of Jewish Involvement in Twentieth-Century Intellectual and Political Movements
The Culture of Critique: An Evolutionary Analysis of Jewish Involvement in Twentieth-Century Intellectual and Political Movements
MacDonald provides a theoretical analysis and review of data on the widespread tendency among certain highly influential, Jewish-dominated intellectual movements to develop radical critiques of gentile culture that are compatible with the continuity of Jewish identification. Particular attention is paid to Boasian anthropology, psychoanalysis,...
Elementary Real Analysis
Elementary Real Analysis

University mathematics departments have for many years offered courses with titles such as Advanced Calculus or Introductory Real Analysis.The se courses are taken by a variety of students, serve a number of purposes, and are written at various levels of sophistication.T he students range from ones who have just completed a course in...

Novell NetWare 6.5 Administrator's Handbook
Novell NetWare 6.5 Administrator's Handbook

Novell NetWare 6.5 Administrators Handbook is the Novell-authorized quick reference for NetWare administration covering all of the new features of NetWare 6.5. The release of NetWare 6.5 continues to redefine NetWare as a powerful Web-oriented platform for delivering a consistent, location...

Escape From Excel Hell: Fixing Problems in Excel 2003, 2002 and 2000 (Mr. Spreadsheet's Bookshelf)
Escape From Excel Hell: Fixing Problems in Excel 2003, 2002 and 2000 (Mr. Spreadsheet's Bookshelf)
When Excel talks back to you, here's what to do

You try to open a spreadsheet and Excel won't let you, because there's a macro involved. You cannot convince the software that the macro is safe. You hurl something across the room.

Grab this book instead! You'll find more than 200 fixes for things...

Fluid Mechanics: An Introduction to the Theory of Fluid Flows
Fluid Mechanics: An Introduction to the Theory of Fluid Flows
Fluid mechanics is a field that spreads widely and to all fields of engineering, science and medicine. The book takes this into account and provides a sound basis.

This is a modern book on fluid mechanics that is written in a way needed these days to teach the subject to students in engineering and science at higher educational institutes. The...

CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud
Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud

Written for IT and business professionals, this book provides the technical and business insight needed to plan, deploy and manage the services provided by the Microsoft Azure cloud. Find out how to integrate the infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) models with your existing business infrastructure while...

CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

Result Page: 15 14 13 12 11 10 9 8 7 6 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy