Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Mac Managed Preferences
Enterprise Mac Managed Preferences

Many systems administrators on the Mac need a way to manage machine configuration after initial setup and deployment. Apple’s Managed Preferences system (also known as MCX) is under-documented, often misunderstood, and sometimes outright unknown by sys admins. MCX is usually deployed in conjunction with an OS X server, but it can also...

Configuring Exchange 2000 Server
Configuring Exchange 2000 Server
C.A. Murff MCSE, MCT, CTT, CNA
Who should read this book? Anyone looking for clear, relevant answers on how to best utilize their existing Exchange 2000 environment.

Configuring Exchange Server 2000 is an intermediate to advanced book for both administrators and developers who are actively using
...
.NET Framework Security
.NET Framework Security
Welcome! The book you hold in your hands is a comprehensive guide and roadmap to the security infrastructure of the Microsoft .NET Framework. The .NET Framework is Microsoft's new cross-language development environment for building rich client applications and XML Web Services. One of the key features of the .NET Framework is a robust security...
Linux Networking Cookbook
Linux Networking Cookbook
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean...
Mastering Active Directory for Windows Server 2008
Mastering Active Directory for Windows Server 2008
Detailed Coverage of Active Directory for Windows Server 2008, 2003, 2003 R2, and 2000

If you are responsible for the day-to-day operations of Active Directory, you need this book. From Windows Server 2000 up through the new features available in Windows Server 2008, this comprehensive guide gives you the practical...

Spring Security 3.1
Spring Security 3.1

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to...

MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure
MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure
Welcome to MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
This kit introduces you to Windows Server 2003 Active Directory and prepares you to plan, configure, and administer your Active Directory infrastructure. You will learn to use Active
...
Content Networking Fundamentals
Content Networking Fundamentals

A comprehensive introduction to the theory and practical applications of content networking 

  • Get a strong introduction to the basic networking concepts necessary for content networking, including network address translation, IP multicast content delivery, quality of service, and...

Mac OS X for Unix Geeks
Mac OS X for Unix Geeks
If you're one of the many Unix developers drawn to Mac OS X for its BSD core, you'll find yourself in surprisingly unfamiliar territory. Even if you're an experienced Mac user, Mac OS X is unlike earlier Macs, and it's radically different from the Unix you've used before, too.

Enter "Mac OS X for Unix Geeks" by Brian Jepson and...

Forensic Science
Forensic Science

This is a comprehensive reference source on the theory, techniques, and application of the various forensic sciences.The past decade has seen an explosion of interest in the application of scientific techniques to investigations of crime. Television audiences have developed a seemingly insatiable appetite for shows such as CSI: Crime Scene...

SQL Server 7 Backup & Recovery
SQL Server 7 Backup & Recovery
Protect your organization's most valuable asset--its data. Develop and implement a thorough data protection solution for your SQL Server 7 database environment. SQL Server 7 Backup & Recovery is your one-stop resource for planning, developing, implementing, and managing backup and restore procedures. Learn to execute data protection strategies,...
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition

Active Directory is a common repository for information about objects that reside on the network, such as users, groups, computers, printers, applications, and files. The default Active Directory schema supports numerous attributes for each object class that can be used to store a variety of information. Access Control Lists (ACLs) are...

Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy