Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Email Security with Cisco IronPort (Networking Technology: Security)
Email Security with Cisco IronPort (Networking Technology: Security)

The Cisco IronPort Email Security Appliances (ESA) have been deployed in thousands of networks to accept, filter, and deliver email messages. The ESA is easy to deploy and its security-filtering settings are effective right out of the box. However, many organizations are looking for more from their messaging environment...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Buying a Computer For Dummies
Buying a Computer For Dummies
Flat display? Satellite modem? What do YOU need?

Decide what you want your computer to do, and then pick the parts that get you there

If your top priority is cool multimedia, you have different computer needs from your pal who can't wait to play games online. Follow Dan's proven system, and you'll come out with the right stuff, buy...

WiX: A Developer's Guide to Windows Installer XML
WiX: A Developer's Guide to Windows Installer XML

A practical guide, this book provides step-by-step instructions for building your installer, showcasing real-world examples throughout. Its purpose is to get the professional developer building installers in no time without getting bogged down in theory. Numerous references to additional resources are provided so that curious readers can...

The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models
The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models

The ability to create and understand financial models that assess the valuation of a company, the projects it undertakes, and its future earnings/profit projections is one of the most valued skills in corporate finance. However, while many business professionals are familiar with financial statements and accounting reports, few are truly...

Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
Java Enterprise Best Practices
Java Enterprise Best Practices
Until Java Enterprise Best Practices, advanced Java developers relied on the advice of a loose-knit community of fellow developers, time-consuming online searches for examples or suggestions for the immediate problem they faced, and tedious trial-and-error. But Java has grown to include a huge number of APIs,...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Principles of Computer Organization and Assembly Language
Principles of Computer Organization and Assembly Language

This is a book on the organization and architecture of theJava Virtual Machine(JVM), the software at the heart of the Java language and is found inside most computers,Web browsers, PDAs, and networked accessories. It also covers general principles of machine organization and architecture, with llustrations from other popular (and...

Delphi in a Nutshell
Delphi in a Nutshell

Aimed at the working Delphi developer, Delphi in a Nutshell is an effective desktop reference to this popular programming tool. Besides listing all core classes and methods, this book also provides a host of expert dos and don'ts for mastering the newest features in Delphi's Object Pascal.

The heart of this book is...

BlackBerry for Work: Productivity for Professionals
BlackBerry for Work: Productivity for Professionals

The BlackBerry is cool, and the BlackBerry is fun, but the BlackBerry also means serious business. For those of you who bought your BlackBerry to help get your life organized and free yourself from the ball-and-chain of desktop computing, BlackBerry at Work: Productivity for Professionals is the book to show you how. There are plenty...

Metrics and Models in Software Quality Engineering, Second Edition
Metrics and Models in Software Quality Engineering, Second Edition

"This is the single best book on software quality engineering and metrics that I've encountered."-Capers Jones, from the Foreword

Metrics and Models in Software Quality Engineering, Second Edition, is the definitive book on this essential topic of software...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy