High Availability and Disaster Recovery: Concepts, Design, Implementation
Companies and other organizations depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based processes. Business continuity is the ability to do business under any circumstances and is an essential requirement modern companies are facing. High availability and disaster...
Professional VMwareServer (Programmer to Programmer) Developing software and testing within virtual machines provides you with countless advantages in terms of automation, stability, disaster recovery, and overall code quality. With this book as your guide, you get the tools you need to create a fleet of virtual machine images that you can use to build your own secure applications.
The Black Death (Great Historic Disasters)
In 1346, Europe was hit by the worst natural disaster
in its recorded history: the Black Death. Generally
believed to be a combination of bubonic plague and two
other plague strains, the Black Death ravaged the length and
breadth of Europe from Sicily to Norway, from Ireland to Russia,
for five terrible years. Scholars can...
Hyper-V Replica Essentials
For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.
A practical step-by-step guide that goes beyond theory and...
Mutiny and Leadership
Whenever leadership emerges within a group, there will be resistance to that leadership. Discontent may manifest in a number of ways, and action will always be determined by factors such as resource, numbers, time, space, and the legitimacy of the resistance. What, then, turns discontent into
Mutiny is often...
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor Hyper-V is one of the top virtualization products, and this practical guide focuses on the essentials of Windows Server 2008 Hyper-V. Written by the Microsoft team behind the Hyper-V product, this book shows you how to perform key virtualization scenarios, such as server consolidation, software test and development, and a dynamic data center and...
Information Warfare: How to Survive Cyber Attacks
"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...
Mastering Microsoft Windows Vista Home: Premium and Basic In-depth Coverage of Windows Vista Home Premium—Including Coverage of Vista Home Basic
Configure, run, and troubleshoot Windows Vista Home Premium or Windows Vista Home Basic with the detailed coverage you'll find in this comprehensive guide. With a task-based approach and clear, no-nonsense instructions,...
IT Auditing: Using Controls to Protect Information Assets
Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...
|Result Page: 30 29 28 27 26 25 24 23 22 21 |