Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...
Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...
“This enjoyable, fast-moving book is concise, relevant, and perceptive. My bottom line is a simple one: This book should be read by all those interested in the way markets operate, be they investors, analysts, or policy makers.”
If you’ve done any previous research on SharePoint disaster recovery topics, such as content recovery, backup and restore, and high availability, you’ve probably found quite a bit of information on the subject. That held true for us when we wrote the original Disaster Recovery Guide for SharePoint 2007, and it’s just as true...
Xen is an open source virtualization technology that allows multiple operating systems to run on a single physical computer system, providing cost savings and increased efficiency. This book presents you with a complete foundation on this exciting technology and shows you how Xen virtualization offers faster response times for new server and...
This book had its genesis in June 1996 when the Wharton Risk Management and Decision Processes Center (Wharton Risk Center) co-hosted a conference on “Information Technology and Its Impact on Catastrophic Risks”. It was one of the events that year celebrating the Anniversary of the first computer (ENIAC) at the...
Git in Practice is a collection of 66 tested techniques that will optimize the way you and your team manage your development projects. The book begins with a brief reminder of the core version control concepts you need when using Git and moves on to the high-value features you may not have explored...
Monitoring and Managing Microsoft Exchange 2000 Server focuses on what to do after Exchange has been deployed—how to design and implement the support infrastructure, how to monitor and manage messaging traffic, and how to avoid disaster through proactive planning and management. ...
Information technology (IT) has the potential to play a critical role in managing natural and human made disasters. Damage to communications infrastructure, along with other communications problems exacerbated the difficulties in carrying out response and recovery efforts following Hurricane Katrina. To assist government planning in this...
This edited volume highlights recent research advances in humanitarian relief logistics. The contributed chapters span the spectrum of key issues and activities from preparedness to mitigation operations (response), planning and execution. The volume also presents state-of-the-art methods and systems through current case studies.
As future generation information technology (FGIT) becomes specialized and fragmented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the...
For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.
Overview
A practical step-by-step guide that goes beyond theory and...