|
|
|
|
|
Mastering Zabbix
Learn how to refine and organize your IT monitoring systems using your existing working knowledge of Zabbix. This step-by-step tutorial will help you unleash the full capabilities of the system.
Overview
-
Create the perfect monitoring configuration based on your specific needs
-
Extract...
| | IT Security Risk Control Management: An Audit Preparation Plan
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.
Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating... | | Geometric Computing Science: First Steps (Interdisciplinary Mathematics, Vol 25)This book outlines a mathematical way of thinking about the interaction of 'pure' and 'applied' computer science. I will be more subjective than is customary in science and mathematics exposition and sketch my personal vision, in terms of my own experience in pure and applied mathematics and my extensive readings in the scholarly computer science... |
|
|
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 |