Home | Amazing | Today | Tags | Publishers | Years | Search 
Metrics and Methods for Security Risk Management
Metrics and Methods for Security Risk Management

Metrics and Methods for Security Risk Management offers powerful analytic tools that have been absent from traditional security texts. This easy-to-read text provides a handy compendium of scientific principles that affect security threats, and establishes quantitative security metrics that facilitate the development of...

Data Protection for Virtual Data Centers
Data Protection for Virtual Data Centers

Essential information on how to protect data in virtual environments!

Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach,...

Oracle Solaris Cluster Essentials (Oracle Solaris System Administration Series)
Oracle Solaris Cluster Essentials (Oracle Solaris System Administration Series)

Thousands of IT organizations have adopted clustering to improve the availability of mission-critical software services. Today, with the rapid growth of cloud computing environments, clustering is even more crucial.

Oracle® Solaris Cluster Essentials is a...

Mathematics for Computer Graphics Applications
Mathematics for Computer Graphics Applications

Computer graphics is more than an isolated discipline at an intersection of computer science, mathematics, and engineering. It is the very visible leading edge of a revolution in how we use computers and automation to enhance our lives. It has changed forever the worlds of engineering and science, medicine, and the media, too. The wonderful...

IT Architecture For Dummies
IT Architecture For Dummies

A solid introduction to the practices, plans, and skills required for developing a smart system architecture

Information architecture combines IT skills with business skills in order to align the IT structure of an organization with the mission, goals, and objectives of its business. This friendly introduction to IT...

Building the Mobile Internet (Networking Technology)
Building the Mobile Internet (Networking Technology)

The complete guide to technologies and protocols for delivering seamless mobile Internet experiences

 

In Building the MobileInternet, three leading mobility architects and implementers from Cisco present complete foundational knowledge about...

Future Generation Information Technology: Second International Conference, FGIT 2010
Future Generation Information Technology: Second International Conference, FGIT 2010

As information technology (IT) becomes specialized and fragmented, it is easy to lose sight that many topics have common threads and because of this, advances in one subdiscipline may transmit to another. The presentation of results between different subdisciplines encourages this interchange for the advancement of IT as a whole.

...

Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor

Get the inside scoop on Hyper-V for Windows Server 2008 R2

Virtualization is a top priority for thousands of companies all over the world. Written by an author team that is part of the Windows virtualization group at Microsoft, Windows Server 2008 R2 Hyper-V will walk you through Hyper-V essentials so you can get you up to...

Calculus For Dummies
Calculus For Dummies

The mere thought of having to take a required calculus course is enough to make legions of students break out in a cold sweat. Others who have no intention of ever studying the subject have this notion that calculus is impossibly difficult unless you happen to be a direct descendant of Einstein.

Well, the good news is that you...

MCITP Self-Paced Training Kit (Exam 70-646): Windows Server 2008 Server Administrator
MCITP Self-Paced Training Kit (Exam 70-646): Windows Server 2008 Server Administrator

This training kit is designed for server and domain administrators who have two to three years of experience managing Windows servers and infrastructure in an environment that typically supports 250 to 5,000 (or even more) users in three or more physical locations and has three or more domain controllers. You will likely be responsible...

Public Libraries and the Internet: Roles, Perspectives, and Implications
Public Libraries and the Internet: Roles, Perspectives, and Implications

The integration of technology into public library services has been a continual process across the eighteenth, nineteenth, twentieth, and twenty-first centuries, in which libraries have responded to new technologies, altering the ways that information could be recorded, accessed, and used. The Internet is a prominent recent example,...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy