Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Special Edition Using Linux System Administration (Special Edition Using)
Special Edition Using Linux System Administration (Special Edition Using)
Special Edition Using Linux Administration is the complete, comprehensive reference book for the experienced administrator who needs to learn to run a Linux system and successfully manage it. This book has a great appeal to those administrators whose knowledge is limited to Windows or NetWare networks as they integrate Linux into their...
Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Video Systems in an IT Environment: The Essentials of Professional Networked Media
Video Systems in an IT Environment: The Essentials of Professional Networked Media
Audio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes technology reviews and the tools to understand and evaluate key aspects of hybrid AV...
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Configuring Juniper Networks NetScreen & SSG Firewalls
Configuring Juniper Networks NetScreen & SSG Firewalls
Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.

Configuring
...
Personal Firewalls for Administrators and Remote Users
Personal Firewalls for Administrators and Remote Users

Personal firewalls explained—for remote corporate and home users.

In today's work environment, increasing numbers of mobile employees are using PCs, laptops, and handheld devices to connect to corporate servers. That's great for productivity, but it can also pose a security nightmare. Many of these...

Linux Networking Clearly Explained
Linux Networking Clearly Explained

"Bryan Pfaffenberger details the configuration and use of GNOME (as well as Enlightenment and KDE) in greater detail than anyother Linux book out there" David Wall of Amazon.com on Linux Clearly Explained

Bryan Pfaffenberger and Michael Jang bring their focused, step-by-step approach which made Linux
...

REST: From Research to Practice
REST: From Research to Practice

Anybody following the discussions around “Web Services” in recent years is aware of the fuzzy definition of the term, and a little bit of history can quite easily explain some of the confusions around current terminology (or use of terminology). The general idea of using Web technologies to not only deliver Web pages (HTML...

Juniper SRX Series
Juniper SRX Series
Security is one of the fastest moving segments within the realm of technology. Whereas most technology is created to offer new services or products, security is created to prevent the abuse of these new products and or services. In today’s world, where we are always connected in ways that have never been...
Computer Network Time Synchronization: The Network Time Protocol
Computer Network Time Synchronization: The Network Time Protocol
This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling...
How Linux Works
How Linux Works

Whether you're a systems administrator or a home user, you need to understand how Linux internals work before you can really master Linux-how it boots, how networking works, how to customize the kernel, and even what hardware to buy.

How Linux Works contains the kind of information normally handed down from
...

Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy