 |
|
 Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... |  |  Windows 7 and Vista Guide to Scripting, Automation, and Command Line Tools
Although this book has a brand new title, it is really an updated and revised second edition to Windows XP: Under The Hood.The first edition’s automotive-themed title came about because of a certain nostalgia that I felt and I know many people share: Don’t you long for the good-old days when you could pop the hood of your car and... |  |  Deploying Microsoft Forefront Threat Management Gateway 2010
When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,... |
|
|
 Taking Your iPhoto '11 to the Max (Technology in Action)
If you have this book in your hands, you’re a person who enjoys photography and wants to get more out of your photographs. You’re also probably at least somewhat familiar with Apple’s iPhoto application; maybe you’ve played around with it, but getting to know everything it can do seems daunting. Not to worry, this book... |  |  Why New Systems Fail: An Insider's Guide to Successful IT Projects
A Fortune 500 manufacturing company spent millions attempting to implement a new enterprise resource planning (ERP) system. Across the globe, a 150-employee marketing firm built and tried to implement a proprietary customer relationship management (CRM) system. For two very different companies doing two very different things, the outcomes... |  |  Cacti 0.8 Beginner's Guide
Generally speaking, network management refers to the tasks associated with running a network, along with the software, tools, and technology required to support these tasks. One major part of running a network is to monitor the devices on it in order to know
what is happening.
One definition of network management from the... |
|
|
Result Page: 977 976 975 974 973 972 971 970 969 968 967 966 965 964 963 962 961 960 959 |