Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security: A Beginner's Guide, Second Edition
Network Security: A Beginner's Guide, Second Edition
Essential Skills--Made Easy!

Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack...

Pro BizTalk 2009
Pro BizTalk 2009

In the beginning, when BizTalk was still in its infancy, there were two teams within Microsoft: the Commerce Server Team and the COM+ team. The Commerce Server Team was implementing technology it called Commerce Server Messaging Pipelines, which was essentially software that allowed applications to move messages from one system to another...

The Power of Real-Time Social Media Marketing: How to Attract and Retain Customers and Grow the Bottom Line in the Globally Connected World
The Power of Real-Time Social Media Marketing: How to Attract and Retain Customers and Grow the Bottom Line in the Globally Connected World

Today's Hottest Trends for On-the-Spot Marketing!

"A must read for media and marketers.”
—Alan Cohen, CEO, OMD USA

"What do fish tacos, data storage, and disaster relief all have in common? Each has harnessed the power of marketing that amplifies via the real-time social web....

Windows Server 2008 Hyper-V Unleashed
Windows Server 2008 Hyper-V Unleashed
Hyper-V is Microsoft’s server virtualization technology built-in to Windows Server 2008.  Virtual Machine Manager 2008 is a System Center add-on that helps organizations better manage their virtual guest images, delegate administration and management, and even extract virtual images from existing physical and virtual servers.  This...
Business Continuity and Disaster Recovery for InfoSec Managers
Business Continuity and Disaster Recovery for InfoSec Managers
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of
...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Restoration and Development of the Degraded Loess Plateau, China (Ecological Research Monographs)
Restoration and Development of the Degraded Loess Plateau, China (Ecological Research Monographs)

This book presents state-of-the-art scientific evidence and technological innovations to restore lands on the Loess Plateau of China, known worldwide for its serious land degradation and desertification problems. Supported by a rapidly developing Chinese economy and the dissemination of effective technology, the Grain-for-Green Project and...

Microsoft SQL Server 2000 High Availability
Microsoft SQL Server 2000 High Availability

Get the definitive reference to maximizing the availability of your critical, SQL Server 2000-based business systems. Developed by Microsoft field consultants who create and support high availability solutions every day, this practical guide explains how to plan, design, implement, and support highly available SQL Server 2000-based systems...

Wireless Sensor Networks: Signal Processing and Communications
Wireless Sensor Networks: Signal Processing and Communications

A wireless sensor network (WSN) uses a number of autonomous devices to cooperatively monitor physical or environmental conditions via a wireless network. Since its military beginnings as a means of battlefield surveillance, practical use of this technology has extended to a range of civilian applications including environmental monitoring,...

Running Xen: A Hands-On Guide to the Art of Virtualization
Running Xen: A Hands-On Guide to the Art of Virtualization
“This accessible and immediately useful book expertly provides the Xen community with everything it needs to know to download, build, deploy and manage Xen implementations.”

—Ian Pratt, Xen Project Leader VP Advanced Technology, Citrix Systems

Handbook of Environmental Health, Fourth Edition, Volume II:  Pollutant Interactions in Air, Water, and Soil
Handbook of Environmental Health, Fourth Edition, Volume II: Pollutant Interactions in Air, Water, and Soil
The book is filled with figures and diagrams. … largely well thought out and useful aids to understanding. … The authors clearly have a very detailed understanding of the relevant laws and provide a comprehensive overview of the links between these and environmental health. … clearly a useful and important reference text. Its...
Database Administration: The Complete Guide to Practices and Procedures
Database Administration: The Complete Guide to Practices and Procedures

"One of Craig's hallmarks is his ability to write in a clear, easy-to-read fashion. The main purpose of any technical book is to transfer information from writer to reader, and Craig has done an excellent job. He wants the reader to learn—and it shows." —Chris Foot, Senior Oracle Certified Instructor,...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy