Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Oracle Database 10g High Availability with RAC, Flashback, and Data Guard (Osborne ORACLE Press Series)
Oracle Database 10g High Availability with RAC, Flashback, and Data Guard (Osborne ORACLE Press Series)
Attain real solutions for current availability challenges. Based on a “DBA-centric” approach to High Availability,Oracle Database 10g High Availability concentrates on explaining 10g technologies and practices to database administrators, covering general availability, real application clusters (RAC), disaster planning and...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)

Cisco® Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco...

Misbehavior in Organizations: Theory, Research, and Management (Applied Psychology Series)
Misbehavior in Organizations: Theory, Research, and Management (Applied Psychology Series)
Ideas for new constructs come from different sources. The idea for Organizational
Misbehavior (OMB) came from a surprise at being caught off guard. The incident
was recorded in Vardi’s personal file and is quoted from there. It happened
during the fall term of 1990 when he taught a course in an Executive MBA program
at
...
HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

The Designer's Guide to VHDL, Volume 3, Third Edition (Systems on Silicon)
The Designer's Guide to VHDL, Volume 3, Third Edition (Systems on Silicon)
VHDL may sound like a new Internet language, but it really stands for VHSIC (Very High Speed Integrated Circuit) Hardware Definition Language. VHDL borrows ideas from software engineering (architectural, behavior, and formal models, as well as modular design) and is used to design today's custom integrated circuits, from cell phones to...
Absolute Beginner's Guide to Personal Firewalls
Absolute Beginner's Guide to Personal Firewalls

The Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal...

The Marketing Agency Blueprint: The Handbook for Building Hybrid PR, SEO, Content, Advertising, and Web Firms
The Marketing Agency Blueprint: The Handbook for Building Hybrid PR, SEO, Content, Advertising, and Web Firms

When I started HubSpot in June 2006 with my business partner, Dharmesh Shah, our experiences with marketing agencies led us to almost entirely avoid working with them. In fact, we designed our original business model around selling our marketing software directly to end customers, and developed an internal marketing team that would not be...

Sams Teach Yourself SQL in 24 Hours (3rd Edition)
Sams Teach Yourself SQL in 24 Hours (3rd Edition)

Sams Teach Yourself SQL in 24 Hours, Third Edition presents the key features of SQL (Structured Query Language) in an easy to understand format with updated code examples, notes, diagrams, exercises, and quizzes. New material covers more information on transactions, constructs, embedded databases, and object-oriented programming. In this...

Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers

Internet Security discusses not only the technology needed to support a solid security strategy, but also those policies and processes that must be incorporated in order for that strategy to work.

New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to...

Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Understanding Knowledge as a Commons: From Theory to Practice
Understanding Knowledge as a Commons: From Theory to Practice
Knowledge in digital form offers unprecedented access to information through the Internet but at the same time is subject to ever-greater restrictions through intellectual property legislation, overpatenting, licensing, overpricing, and lack of preservation. Looking at knowledge as a commons--as a shared resource--allows us to understand both its...
Result Page: 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy