 |
|
 Microsoft Windows 7 UnleashedCovers Release Candidate of Windows 7.
With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.
Microsoft® Windows 7 Unleashed... |  |  |  |  CCNA Security Lab Manual
The only authorized Lab Portfolio for the new Cisco Networking Academy CCNA Security Course
-
Gives CCNA Security students a comprehensive, printed and bound lab resource containing all of the course's labs, for use whenever Internet access isn't available
-
Handy printed...
|
|
|
 Cisco LAN Switching Configuration Handbook (2nd Edition)
Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series... |  |  How to Do Everything Netbook
Get the most out of your netbook!
Now that you've got a netbook, it's time to find out how to maximize all of its capabilities. This hands-on guide explains how you can keep your netbook running at peak performance by limiting how many programs you run concurrently and what you download. Learn the best ways to connect to... |  |  IBM WebSphere DataPower SOA Appliance Handbook
Expert Guide to Deploying, Using, and Managing DataPower SOA Appliances
IBM® WebSphere® DataPower® appliances can simplify SOA deployment, strengthen SOA security, enhance SOA performance, and dramatically improve SOA return on... |
|
 Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Microsoft SQL Azure Enterprise Application Development
SQL Azure is a database service in the cloud. Based on Microsoft's Windows Azure platform, SQL Azure is well suited for web facing database applications. Are you interested in moving your business applications and data to the cloud but are not sure how to go about it? Look no further; this book covers all you ever wanted to know about... |  |  Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... |
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |