Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Intelligent Negotiator: What to Say, What to Do, How to Get What You Want--Every Time
The Intelligent Negotiator: What to Say, What to Do, How to Get What You Want--Every Time

Nearly every professional interaction you have during your career will involve a negotiation of some sort. Whether you're closing a million-dollar deal with a client, bargaining over your own terms of employment, or delegating duties among your coworkers, the key to successful negotiation is possessing intelligence. But intelligence...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

ModSecurity 2.5
ModSecurity 2.5
With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you...
Managing Cisco Network Security
Managing Cisco Network Security
Providing good internetwork security and remaining current on new
hardware and software products is a never-ending task. Every network
security manager aims to achieve the best possible security because
the risks are real and the stakes are high. An enterprise must decide
what level of security is required, taking into account
...
Becoming
Becoming
Do you remember your radio and "Captain Midnight," "The Lone Ranger," "Junior Miss" and "Let's Pretend"? The first time you inhaled a cigarette? Your first swallow of hard liquor? The thrill of the first exploration of the body of your boyfriend, girlfriend, husband, wife... your own body? Your first...
Firewalls for Dummies, Second Edition
Firewalls for Dummies, Second Edition
Guard your DSL and protect your personal information

Keep your network safe from viruses, saboteurs, eavesdroppers, and other bad guys

We don’t want to scare you, but "they" are out there! Don’t venture into lawless cyberspace without this trusty guide. It’ll help you evaluate the danger, understand how...

PeopleSoft for the Oracle DBA
PeopleSoft for the Oracle DBA

This book is aimed at helping Oracle DBAs understand and use PeopleSoft technology. For the typical DBA, the introduction to PeopleSoft is likely to include some surprises, not all of them agreeable. Many—if not most—DBAs have to deal with many different databases, usually supporting different applications. Often they will want to...

Enterprise Security: The Manager's Defense Guide
Enterprise Security: The Manager's Defense Guide

E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...

Oracle Data Guard 11g Handbook (Osborne ORACLE Press Series)
Oracle Data Guard 11g Handbook (Osborne ORACLE Press Series)

Provide superior data protection, availability, and disaster recovery using the tested techniques in this Oracle Press guide. Cowritten by a team of Oracle experts, Oracle Data Guard 11g Handbook provides a sound architectural foundation along with best practices for configuration, monitoring, maintenance, and troubleshooting. You...

MongoDB in Action
MongoDB in Action

Databases are the workhorses of the information age. Like Atlas, they go largely unnoticed in supporting the digital world we’ve come to inhabit. It’s easy to forget that our digital interactions, from commenting and tweeting to searching and sorting, are in essence interactions with a database. Because of this fundamental...

Getting Started with Hazelcast - Second Edition
Getting Started with Hazelcast - Second Edition

Get acquainted with the highly scalable data grid, Hazelcast, and learn how to bring its powerful in-memory features into your application

About This Book

  • Store and pass data in your application using Hazelcast's scalable and resilient collections, working with real code and examples to see what is...
Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy