Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Professional SharePoint 2010 Administration
Professional SharePoint 2010 Administration

Thorough coverage of the improvements and changes to SharePoint 2010

SharePoint 2010 boasts a variety of incredible new features that will challenge even the most experienced administrator who is upgrading from SharePoint 2007. Written by a team of SharePoint experts, this book places a takes aim at showing you how to make these...

Understanding and Reducing Landslide Disaster Risk: Volume 4 Testing, Modeling and Risk Assessment (ICL Contribution to Landslide Disaster Risk Reduction)
Understanding and Reducing Landslide Disaster Risk: Volume 4 Testing, Modeling and Risk Assessment (ICL Contribution to Landslide Disaster Risk Reduction)

This book is a part of ICL new book series “ICL Contribution to Landslide Disaster Risk Reduction” founded in 2019. Peer-reviewed papers submitted to the Fifth World Landslide Forum were published in six volumes of this book series. This book contains the followings:

• Five keynote lectures

...

Designing Highly Available Web Solutions with Microsoft Windows 2000 Server Technologies (With CD-ROM)
Designing Highly Available Web Solutions with Microsoft Windows 2000 Server Technologies (With CD-ROM)
Welcome to MCSE Training Kit—Designing Highly Available Web Solutions with Microsoft Windows 2000 Server Technologies. This book guides you through the process of designing Web sites that are highly available. You’ll learn how to design network topologies that support redundant components, connections, and services....
Mastering Microsoft Exchange Server 2007
Mastering Microsoft Exchange Server 2007

By utilizing the latest features of Microsoft Exchange Server 2007, you'll be able to provide your company with the security it needs while enabling employees to access critical information regardless of their location or type of device.

Now with this comprehensive guide, you'll find out how to effectively install, configure, and manage...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Windows Server 2012 Hyper-V Installation and Configuration Guide
Windows Server 2012 Hyper-V Installation and Configuration Guide

Go-to guide for using Microsoft's updated Hyper-V as a virtualization solution

Windows Server 2012 Hyper-V offers greater scalability, new components, and more options than ever before for large enterprise systems and small/medium businesses. Windows Server 2012 Hyper-V Installation and Configuration Guide is...

UNIX Backup and Recovery
UNIX Backup and Recovery
Unix Backup & Recovery provides a complete overview of all facets of Unix backup and recovery, and offers practical, affordable backup and recovery solutions for environments of all sizes and budgets. The book begins with detailed explanations of the native backup utilities available to the Unix...
Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference
Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference

You're in charge of IT, facilities, or core operations for your organization when a hurricane or a fast-moving wildfire hits. What do you do?

Simple. You follow your business continuity/disaster recovery plan. If you've prepared in advance, your operation or your company can continue to conduct business while...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

LANs to WANs: The Complete Management Guide
LANs to WANs: The Complete Management Guide
This text addresses key network management challenges, showing professionals how to tie together incompatible LANs, meld legacy systems and LANs, extend the reach of LANs with wireless links, and protect information assets from various disaster scenarios.

Empowered by today’s high-performance computers interconnected over LANs and...

Sams Teach Yourself Visual Basic 2008 in 24 Hours: Complete Starter Kit
Sams Teach Yourself Visual Basic 2008 in 24 Hours: Complete Starter Kit
In just 24 sessions of one hour or less, you will be up and running with Visual Basic 2008. Using a straightforward, step-by-step approach, each lesson builds upon a real-world foundation forged in both technology and business matters, allowing you to learn the essentials of Visual Basic 2008 from the ground up. Step-by-step instructions carefully...
Pro Exchange Server 2013 Administration (Expert's Voice in Exchange)
Pro Exchange Server 2013 Administration (Expert's Voice in Exchange)

What you’ll learn

  • A comprehensive set of best practices for administering Exchange Server 2013 on a daily basis.
  • A thorough understanding of new features.
  • How to design and deploy new Exchange 2013 servers and upgrade existing Exchange servers to Exchange 2013.
  • Learn best...
unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy