Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft SharePoint: Building Office 2003 Solutions
Microsoft SharePoint: Building Office 2003 Solutions

This book provides guidance to readers who want to design and deploy business solutions based on Microsoft SharePoint technologies. In this book, Hillier will define the business case and scenarios for Microsoft SharePoint technologies. Hillier will also review the installation, configuration, and administration of business solutions based...

Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
The Hidden Power of Photoshop CS
The Hidden Power of Photoshop CS
AlthoughI wasn’t really thinking about it at the time, in a way, I really started writing this book in 1992 when I first started using Photoshop professionally (with Photoshop 2). At the time I wasn’t planning to write a book, but I had already been involved with scanning and editing digital artwork for several years. I had become...
Multisite Commerce: Proven Principles for Overcoming the Business, Organizational, and Technical Challenges
Multisite Commerce: Proven Principles for Overcoming the Business, Organizational, and Technical Challenges

Plan, Manage, and Architect Multiple Web Sites for Maximum Efficiency and Business Value

 

For many companies, one Web site is no longer enough. Business strategy requires multiple Web sites, each with carefully targeted audiences and marketing...

ePublishing with InDesign CS6: Design and produce digital publications for tablets, ereaders, smartphones, and more
ePublishing with InDesign CS6: Design and produce digital publications for tablets, ereaders, smartphones, and more

Here's the designer's guide to creating excellent e-books with InDesign

Creative professionals are designing more and more e-books and e-zines as digital publishing increasingly gains market share. This book pulls together a wide range of essential information to help them maximize the versatility of InDesign for...

Windows Server 2008 R2 Remote Desktop Services Resource Kit
Windows Server 2008 R2 Remote Desktop Services Resource Kit

In-depth and comprehensive, this official Microsoft RESOURCE KIT delivers the information you need to plan, deploy, and administer Remote Desktop Services in Windows Server 2008 R2. You get authoritative technical guidance from those who know the technology best-leading industry experts and members of the Microsoft Desktop Virtualization...

Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

60 Recipes for Apache CloudStack: Using the CloudStack Ecosystem
60 Recipes for Apache CloudStack: Using the CloudStack Ecosystem

Planning to deploy and maintain a public, private, or hybrid cloud service? This cookbook’s handy how-to recipes help you quickly learn and install Apache CloudStack, along with several API clients, API wrappers, data architectures, and configuration management technologies that work as part of CloudStack’s ecosystem.

...
Deploying IPv6 Networks
Deploying IPv6 Networks

An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.

  • Learn about IPv6 services and the relevant IPv6 features that make them possible

  • Plan, deploy, and manage IPv6 services at...

The McGraw-Hill 36-Hour Course: Project Management, Second Edition
The McGraw-Hill 36-Hour Course: Project Management, Second Edition

Schedule and coordinate projects seamlessly, start to finish!

In today's ultracompetitive world of business, those in charge want results on time and on budget--and they're turning to project managers to deliver. Skilled project managers are in high demand, and the profession is growing at an unprecedented rate.

...

unlimited object storage image
Result Page: 120 119 118 117 116 115 114 113 112 111 110 109 108 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy