Home | Amazing | Today | Tags | Publishers | Years | Search 
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Do you really understand your online presence? Are you confident that visitors can use your website? Do you know their motivations? How do online communities perceive your company? To innovate and adapt your business quickly, you must know the answers to these questions. Complete Web Monitoring demonstrates how to measure every aspect of your web...
Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Expert Python Programming
Expert Python Programming

Expert Python Programming shows how Python development should be done with best practices and expert design tips. This book is for Python developers who are already building applications, but want to build better ones by applying best practices and new development techniques to their projects. The reader is expected to have a sound background...

Microsoft Exchange Server 2007 with SP1: Tony Redmond's Guide to Successful Implementation
Microsoft Exchange Server 2007 with SP1: Tony Redmond's Guide to Successful Implementation
Exchange 2007 represents the biggest advance in the history of Microsoft Exchange Server technology. Given Exchange's leap to x64 architecture and its wide array of new features, it isn't surprising that the SP1 release of 2007 would be particularly robust in terms of hotfixes, security enhancements and additional functionality.

Tony
...
High Performance Data Network Design (IDC Technology)
High Performance Data Network Design (IDC Technology)
The proliferation and complexity of data networks today is challenging our ability to design and manage them effectively. A new generation of Internet, e-commerce, and multimedia applications has changed traditional assumptions on traffic dynamics, and demands tight quality of service and security guarantees. These issues, combined with the...
Digital Watermarking: Principles & Practice (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking: Principles & Practice (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital...
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
Ensure that your WAN can handle the latest technologies with this must-have strategy guide

If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with the emergence of new technologies such as VPNs, multi-service networks, and
...
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the...
Mobilizing Generation 2.0: A Practical Guide to Using Web2.0 Technologies to Recruit, Organize and Engage Youth
Mobilizing Generation 2.0: A Practical Guide to Using Web2.0 Technologies to Recruit, Organize and Engage Youth

Mobilizing Generation 2.0

Mobilizing Generation 2.0 is a practical and immediately useful guide for nonprofits, political campaigns, organizers, and individuals who want to better understand how to use Web 2.0 technologies. In easy-to-understand terms, this accessible book describes how readers can leverage new media (blogs,...

Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy