Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Networks: Routing, Seurity, and Performance Optimization
Data Networks: Routing, Seurity, and Performance Optimization

Data Networks builds on the foundation laid in Kenyon’s first book, High Performance Data Network Design, with expanded coverage of routing, tuning, and troubleshooting. Kenyon provides strategies for overcoming some of the most challenging problems in network design and management. He provides clear, specific solutions for...

Microsoft SharePoint 2013 Disaster Recovery Guide
Microsoft SharePoint 2013 Disaster Recovery Guide

Learn everything you need to know to design and implement a solid disaster recovery plan for SharePoint 2013

Overview

  • Design, implement, test, and execute solid disaster recovery plans for your SharePoint environment with this essential guide
  • Learn outofthebox backup and restore...
Disaster Recovery Gotchas - Watch Out For These Common Mistakes!
Disaster Recovery Gotchas - Watch Out For These Common Mistakes!

Information is power - you know that. But, how do you research the best Disaster Recovery strategies, without spending too much of your time (and money) on it? The average person earns $ 1100 per week, which equates to $ 27 per hour. Trying to do the research yourself would take you at least 5 hours to come up with the best information, AND...

Windows Vista: Beyond the Manual
Windows Vista: Beyond the Manual
Windows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft client operating system on the market. It guides you through the complexities of configuring and running a successful Windows Vista client computer. It also takes an in-depth look at the wealth of features and...
Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

Mastering VMware vSphere 5.5
Mastering VMware vSphere 5.5

The 2013 edition of the bestselling vSphere book on the market

Virtualization remains the hottest trend in the IT world, and VMware vSphere is the industry's most widely deployed virtualization solution. The demand for IT professionals skilled in virtualization and cloud-related technologies is great and expected to keep...

Complete Book of Remote Access: Connectivity and Security (Best Practices)
Complete Book of Remote Access: Connectivity and Security (Best Practices)

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how...

Networking, A Beginner's Guide, Fifth Edition (Networking Professional's Library)
Networking, A Beginner's Guide, Fifth Edition (Networking Professional's Library)

A practical guide to networking fundamentals

Fully up to date with the latest technologies, this introductory handbook covers wired and wireless network design, configuration, hardware, protocols, security, backup, recovery, virtualization, and more. After laying the groundwork, Networking: A Beginner's Guide, Fifth...

CISSP Training Kit
CISSP Training Kit

Your 2-in-1 Self-Paced Training Kit

EXAM PREP GUIDE

Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying
...

Disaster Recovery: Used or Misused Development Opportunity (Disaster Risk Reduction)
Disaster Recovery: Used or Misused Development Opportunity (Disaster Risk Reduction)

This book explains key lessons learned from diverse disaster situations and analyzes them within the framework of governance, education, and technology, providing a framework for disaster recovery as a development opportunity. In post-disaster situations, different types of resources are put into the affected region, varying according to...

Using Social Media for Global Security
Using Social Media for Global Security

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!

During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and...

Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy