|
|
|
|
Data Networks: Routing, Seurity, and Performance OptimizationData Networks builds on the foundation laid in Kenyon’s first book, High Performance Data Network Design, with expanded coverage of routing, tuning, and troubleshooting. Kenyon provides strategies for overcoming some of the most challenging problems in network design and management. He provides clear, specific solutions for... | | Microsoft SharePoint 2013 Disaster Recovery Guide
Learn everything you need to know to design and implement a solid disaster recovery plan for SharePoint 2013
Overview
-
Design, implement, test, and execute solid disaster recovery plans for your SharePoint environment with this essential guide
-
Learn outofthebox backup and restore...
| | Disaster Recovery Gotchas - Watch Out For These Common Mistakes!
Information is power - you know that. But, how do you research the best Disaster Recovery strategies, without spending too much of your time (and money) on it? The average person earns $ 1100 per week, which equates to $ 27 per hour. Trying to do the research yourself would take you at least 5 hours to come up with the best information, AND... |
|
Windows Vista: Beyond the ManualWindows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft client operating system on the market. It guides you through the complexities of configuring and running a successful Windows Vista client computer. It also takes an in-depth look at the wealth of features and... | | Virtualization Security: Protecting Virtualized Environments
Securing virtual environments for VMware, Citrix, and Microsoft hypervisors
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,... | | Mastering VMware vSphere 5.5
The 2013 edition of the bestselling vSphere book on the market
Virtualization remains the hottest trend in the IT world, and VMware vSphere is the industry's most widely deployed virtualization solution. The demand for IT professionals skilled in virtualization and cloud-related technologies is great and expected to keep... |
|
Complete Book of Remote Access: Connectivity and Security (Best Practices)
As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how... | | Networking, A Beginner's Guide, Fifth Edition (Networking Professional's Library)A practical guide to networking fundamentals
Fully up to date with the latest technologies, this introductory handbook covers wired and wireless network design, configuration, hardware, protocols, security, backup, recovery, virtualization, and more. After laying the groundwork, Networking: A Beginner's Guide, Fifth... | | CISSP Training Kit
Your 2-in-1 Self-Paced Training Kit
EXAM PREP GUIDE
Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying... |
|
| | Using Social Media for Global Security
Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!
During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and... | | Cybersecurity for Executives: A Practical Guide
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business
-
Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
-
Covers 'What to...
|
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |