Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Project Management Nation : Goals for the New and Practicing IT Project Manager - Guidance, Tools, Templates and Techniques that Work!
Project Management Nation : Goals for the New and Practicing IT Project Manager - Guidance, Tools, Templates and Techniques that Work!
Organizations depend on IT project managers to support overall business strategies with clear-cut benefits and advantages. As the bridge between the larger business strategy and the functional project level, project managers are expected to ensure key benefits such as reduced delivery costs, accelerated product-to-market speed, focus on client...
Softswitch : Architecture for VoIP (Professional Telecom)
Softswitch : Architecture for VoIP (Professional Telecom)
SOFTSWITCH DISSECTED

SOFT OR HARD? Hardware switches can cost tens of millions and occupy a city block in real estate. Softswitches are a fraction of the cost and the size of a refrigerator. Bypassing big iron can also make for a more efficient development environment, potentially offering more...

Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Microsoft  SharePoint  Products and Technologies Administrator's Pocket Consultant
Microsoft SharePoint Products and Technologies Administrator's Pocket Consultant

Get fast answers for the day-to-day administration of Windows SharePoint Services 3.0 and Office SharePoint Server 2007. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the precise information you need to get the job done-whether you’re at your desk or in the field!

...
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Network Performance Toolkit: Using Open Source Testing Tools
Network Performance Toolkit: Using Open Source Testing Tools
All of the tools you’ll need to ensure that your network and its applications are performing properly for your environment

As a network administrator, you are the first person customers come to whenever there are performance issues with the network. You have to keep the customers satisfied, but the complaints don’t make your job...

Information Operations Planning
Information Operations Planning
Information operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with...
Solr 1.4 Enterprise Search Server
Solr 1.4 Enterprise Search Server
If you are a developer building a high-traffic web site, you need to have a terrific search engine. Sites like Netflix.com and Zappos.com employ Solr, an open source enterprise search server, which uses and extends the Lucene search library. This is the first book in the market on Solr and it will show you how to optimize your web site for high...
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
Cell Death: Mechanism and Disease
Cell Death: Mechanism and Disease

Beginning from centuries of anecdotal descriptions of cell death, such as those on the development of the midwife toad in 1842 by Carl Vogt, to modern-day investigations of cell death as a biological discipline, it has become accepted that cell death in multicellular organisms is a normal part of life. This book provides a comprehensive...

Smart and Gets Things Done: Joel Spolsky's Concise Guide to Finding the Best Technical Talent
Smart and Gets Things Done: Joel Spolsky's Concise Guide to Finding the Best Technical Talent
A guide to attracting, recruiting, interviewing, and hiring the best technical talent.
  • A comprehensive system for hiring top-notch technical employees
  • Packed with useful information and specific advice written in a breezy, humorous style
  • Learn how to find great people--and get them to work for you--in an...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy