Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft  Exchange Server 2007 Administrator's Pocket Consultant (Pro Administrator's)
Microsoft Exchange Server 2007 Administrator's Pocket Consultant (Pro Administrator's)
Here's the practical, pocket-sized reference for IT professionals who administer and support Microsoft Exchange Server 2007. This unique guide provides essential details for using this next-generation messaging and collaboration platform to deliver better performance, interoperability, and end-user experience. Written by an award-winning...
Pro T-SQL 2008 Programmers Guide (Expert's Voice in SQL Server)
Pro T-SQL 2008 Programmers Guide (Expert's Voice in SQL Server)
Discussing new and existing features, SQL Server designer and administrator Michael Coles takes you on an expert guided tour of Transact–SQL functionality in SQL Server 2008 in his book Pro T–SQL 2008 Programmer’s Guide. Fully functioning examples and downloadable source code bring Coles’...
Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

iOS Application Security: The Definitive Guide for Hackers and Developers
iOS Application Security: The Definitive Guide for Hackers and Developers
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.

After a crash course
...
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.>

  • Comprehensive coverage and practical examples of the industry...

Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers

Internet Security discusses not only the technology needed to support a solid security strategy, but also those policies and processes that must be incorporated in order for that strategy to work.

New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to...

Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
"He has written an excellent book that belongs in your personal library." Cryptologia

"Churchhouse (emer., Cardiff Univ., Wales) offers a history and explanation of codes, ciphers, cryptography, and cryptanalysis from Julius Caesar and WWII code-breaking activities to the present day including the world of the Internet.
...
Pro ASP.NET 2.0 in C# 2005, Special Edition
Pro ASP.NET 2.0 in C# 2005, Special Edition

Welcome to Pro ASP.NET 2.0 in C# 2005, Special Edition. In this book, you'll learn how ASP.NET 2.0 really works. You won't be bored with a rehash of the C# language--instead, you'll get the hard-won practical advice that you need to build sophisticated, scalable websites. New features are clearly identified, so if you've programmed with...

Windows Vista Administration: The Definitive Guide
Windows Vista Administration: The Definitive Guide
Whether you're a system administrator responsible for hundreds of Windows clients, or a just a roomful of computers, this book will help you install, configure, and maintain Microsoft's newest OS. Written in jargon-free English that puts concepts in proper context, the book gives you a better understanding of Vista's innovations and capabilities,...
Getting Started with ownCloud
Getting Started with ownCloud

Making your data easily accessible on multiple devices is the primary goal of ownCloud. It gives you control of your own data along with the flexibility to set it up the way you want it. Community backup to the project ensures high quality software and gives you the power to modify and create features.

Getting Started with ownCloud...

Practical Hadoop Security
Practical Hadoop Security

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive...

Windows Server 2003 Bible
Windows Server 2003 Bible
If Windows Server 2003 can do it, you can do it, too ...

This comprehensive reference provides what you need to plan, install, configure, and maintain a Windows Server 2003 R2, SP1, operating system. Covering critical new SP1 security features, the new Windows Update service, and expanded Active Directory...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy