Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

The Fearful Rise of Markets: Global Bubbles, Synchronized Meltdowns, and How To Prevent Them in the Future
The Fearful Rise of Markets: Global Bubbles, Synchronized Meltdowns, and How To Prevent Them in the Future

“This enjoyable, fast-moving book is concise, relevant, and perceptive. My bottom line is a simple one: This book should be read by all those interested in the way markets operate, be they investors, analysts, or policy makers.”

From the Foreword by Mohamed A....

SharePoint 2010 Disaster Recovery Guide
SharePoint 2010 Disaster Recovery Guide

If you’ve done any previous research on SharePoint disaster recovery topics, such as content recovery, backup and restore, and high availability, you’ve probably found quite a bit of information on the subject. That held true for us when we wrote the original Disaster Recovery Guide for SharePoint 2007, and it’s just as true...

Professional Xen Virtualization
Professional Xen Virtualization
Xen is an open source virtualization technology that allows multiple operating systems to run on a single physical computer system, providing cost savings and increased efficiency. This book presents you with a complete foundation on this exciting technology and shows you how Xen virtualization offers faster response times for new server and...
Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
This book had its genesis in June 1996 when the Wharton Risk
Management and Decision Processes Center (Wharton Risk Center) co-hosted
a conference on “Information Technology and Its Impact on Catastrophic
Risks”. It was one of the events that year celebrating the Anniversary of
the first computer (ENIAC) at the
...
Git in Practice
Git in Practice

Summary

Git in Practice is a collection of 66 tested techniques that will optimize the way you and your team manage your development projects. The book begins with a brief reminder of the core version control concepts you need when using Git and moves on to the high-value features you may not have explored...

Monitoring and Managing Microsoft Exchange 2000 Server (HP Technologies)
Monitoring and Managing Microsoft Exchange 2000 Server (HP Technologies)

Monitoring and Managing Microsoft Exchange 2000 Server focuses on what to do after Exchange has been deployed—how to design and implement the support infrastructure, how to monitor and manage messaging traffic, and how to avoid disaster through proactive planning and management. ...

Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery
Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery

Information technology (IT) has the potential to play a critical role in managing natural and human made disasters. Damage to communications infrastructure, along with other communications problems exacerbated the difficulties in carrying out response and recovery efforts following Hurricane Katrina. To assist government planning in this...

Humanitarian and Relief Logistics: Research Issues, Case Studies and Future Trends
Humanitarian and Relief Logistics: Research Issues, Case Studies and Future Trends

This edited volume highlights recent research advances in humanitarian relief logistics. The contributed chapters span the spectrum of key issues and activities from preparedness to mitigation operations (response), planning and execution. The volume also presents state-of-the-art methods and systems through current case studies.

...

Control and Automation: International Conference, CA 2009, Held as Part of the Future Generation Information Technology Conference
Control and Automation: International Conference, CA 2009, Held as Part of the Future Generation Information Technology Conference

As future generation information technology (FGIT) becomes specialized and fragmented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the...

Hyper-V Replica Essentials
Hyper-V Replica Essentials

For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.

Overview

  • A practical step-by-step guide that goes beyond theory and...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy