Home | Amazing | Today | Tags | Publishers | Years | Search 
PeopleSoft for the Oracle DBA
PeopleSoft for the Oracle DBA

This book is aimed at helping Oracle DBAs understand and use PeopleSoft technology. For the typical DBA, the introduction to PeopleSoft is likely to include some surprises, not all of them agreeable. Many—if not most—DBAs have to deal with many different databases, usually supporting different applications. Often they will want to...

Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers

Internet Security discusses not only the technology needed to support a solid security strategy, but also those policies and processes that must be incorporated in order for that strategy to work.

New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to...

HackNotes(tm) Windows Security Portable Reference
HackNotes(tm) Windows Security Portable Reference

HackNotes Windows Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques used by criminals to break into computer networks. Understand how the attacks work, then learn how to access and strengthen your Windows systems through a series of tested and trusted anti-hacking methods,...

HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

Firewalls for Dummies, Second Edition
Firewalls for Dummies, Second Edition
Guard your DSL and protect your personal information

Keep your network safe from viruses, saboteurs, eavesdroppers, and other bad guys

We don’t want to scare you, but "they" are out there! Don’t venture into lawless cyberspace without this trusty guide. It’ll help you evaluate the danger, understand how...

PC Magazine Wireless Solutions
PC Magazine Wireless Solutions
Wireless is freedom. Wireless is now. And who better than PC Magazine to help you break free?

Wireless is more than cell phones. It's Web surfing from your deck, or tuning up your Xbox® to take on opponents on the opposite coast. But whatever wireless is, it isn't simple—or it wasn't, until these two guys made it so. Here's the...

GPRS in Practice : A Companion to the Specifications
GPRS in Practice : A Companion to the Specifications
GPRS is now an established technology allowing packet-data access to the internet and intranets and it is expected that consumer demand for the service will continue to increase, especially when the higher data rates are made available.

The GPRS technology is also carried forward to the 3G systems and it is vital that engineers working in...

The Little Black Book of Project Management
The Little Black Book of Project Management
This Little Black Book shows you how to take charge of a big project, define it, and then break it down into
smaller, more manageable phases. You will learn how to control a budget and schedule and lead a project
team through to successful completion. You will find out how to anticipate problems and plan for them during
the various
...
Windows Admin Scripting Little Black Book, Second Edition
Windows Admin Scripting Little Black Book, Second Edition
This book shows Windows XP and 2003 users and administrators how to perform Windows management and administrative tasks using powerful scripts for just about every important task imaginable.

Windows Admin Scripting Little Black Book, 2nd Edition, shows Windows XP and 2003 users and administrators how to perform Windows management...

Innocent Code : A Security Wake-Up Call for Web Programmers
Innocent Code : A Security Wake-Up Call for Web Programmers
This book is an entertaining read, that shows how to change your mindset from website construction to website destruction so as to avoid writing dangerous code.

This concise and practical book will show where code vulnerabilities lie and how best to fix them. Its value is in showing where code may be exploited to gain access to--or break...

Oracle Database 10g High Availability with RAC, Flashback, and Data Guard (Osborne ORACLE Press Series)
Oracle Database 10g High Availability with RAC, Flashback, and Data Guard (Osborne ORACLE Press Series)
Attain real solutions for current availability challenges. Based on a “DBA-centric” approach to High Availability,Oracle Database 10g High Availability concentrates on explaining 10g technologies and practices to database administrators, covering general availability, real application clusters (RAC), disaster planning and...
Managing Cisco Network Security
Managing Cisco Network Security
Providing good internetwork security and remaining current on new
hardware and software products is a never-ending task. Every network
security manager aims to achieve the best possible security because
the risks are real and the stakes are high. An enterprise must decide
what level of security is required, taking into account
...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy