Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud
Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud

Written for IT and business professionals, this book provides the technical and business insight needed to plan, deploy and manage the services provided by the Microsoft Azure cloud. Find out how to integrate the infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) models with your existing business infrastructure while...

The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

Microsoft SharePoint 2010 Administrator's Pocket Consultant
Microsoft SharePoint 2010 Administrator's Pocket Consultant

Portable and precise, this pocket-sized guide delivers ready answers for the day-to-day administration of SharePoint 2010. Featuring easy-to-scan tables, step-by-step instructions, and handy lists, this book offers the streamlined, straightforward information you need to solve problems and get the job done-whether at your desk or in...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

SAP HANA Cookbook
SAP HANA Cookbook

Your all-inclusive guide to understanding SAP HANA with practical recipes

Overview

  • Understand the architecture of SAP HANA, effectively transforming your business with the modeler and in-memory computing engine
  • Learn about Business Intelligence, Analytics, and Predictive analytics on top of...
Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

VMware View Security Essentials
VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering...

Professional Microsoft SQL Server 2014 Integration Services (Wrox Programmer to Programmer)
Professional Microsoft SQL Server 2014 Integration Services (Wrox Programmer to Programmer)

Fill the gap between planning and doing with SSIS 2014

The 2014 release of Microsoft's SQL Server Integration Services provides enhancements for managing extraction, transformation, and load operations, plus expanded in-memory capabilities, improved disaster recovery, increased scalability, and much more. The increased...

AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Result Page: 28 27 26 25 24 23 22 21 20 19 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy