Home | Amazing | Today | Tags | Publishers | Years | Search 
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Windows 7 and Vista Guide to Scripting, Automation, and Command Line Tools
Windows 7 and Vista Guide to Scripting, Automation, and Command Line Tools

Although this book has a brand new title, it is really an updated and revised second edition to Windows XP: Under The Hood.The first edition’s automotive-themed title came about because of a certain nostalgia that I felt and I know many people share: Don’t you long for the good-old days when you could pop the hood of your car and...

Deploying Microsoft Forefront Threat Management Gateway 2010
Deploying Microsoft Forefront Threat Management Gateway 2010

When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,...

The Art of LEGO MINDSTORMS NXT-G Programming
The Art of LEGO MINDSTORMS NXT-G Programming

This book is about learning how to write programs for LEGO MINDSTORMS NXT robots. The LEGO MINDSTORMS software and its NXT-G programming language are powerful tools that make it easy to write custom programs. This book will teach you how to get the most out of the NXT-G language as you acquire the programming skills necessary to...

IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations
IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations

My first encounter with software configuration management was way back in the eighties while at university – and way before I knew that it was called software configuration management. We were doing a student project and were five people working on this group project. I was coding away, slipping into experiments that eventually took the...

A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)

Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.

As the...

Taking Your iPhoto '11 to the Max (Technology in Action)
Taking Your iPhoto '11 to the Max (Technology in Action)

If you have this book in your hands, you’re a person who enjoys photography and wants to get more out of your photographs. You’re also probably at least somewhat familiar with Apple’s iPhoto application; maybe you’ve played around with it, but getting to know everything it can do seems daunting. Not to worry, this book...

Why New Systems Fail: An Insider's Guide to Successful IT Projects
Why New Systems Fail: An Insider's Guide to Successful IT Projects

A Fortune 500 manufacturing company spent millions attempting to implement a new enterprise resource planning (ERP) system. Across the globe, a 150-employee marketing firm built and tried to implement a proprietary customer relationship management (CRM) system. For two very different companies doing two very different things, the outcomes...

Cacti 0.8 Beginner's Guide
Cacti 0.8 Beginner's Guide

Generally speaking, network management refers to the tasks associated with running a network, along with the software, tools, and technology required to support these tasks. One major part of running a network is to monitor the devices on it in order to know
what is happening.

One definition of network management from the...

The Definitive Guide to MongoDB: The NoSQL Database for Cloud and Desktop Computing
The Definitive Guide to MongoDB: The NoSQL Database for Cloud and Desktop Computing

MongoDB, a cross-platform NoSQL database, is the fastest-growing new database in the world. MongoDB provides a rich document-oriented structure with dynamic queries that you’ll recognize from RDBMS offerings such as MySQL. In other words, this is a book about a NoSQL database that does not require the SQL crowd to re-learn how the...

Tcl/Tk 8.5 Programming Cookbook
Tcl/Tk 8.5 Programming Cookbook

Created in 1988 by John Ousterhoult, while working at the University of Califormia, Berkeley, Tcl (Tool Command Language) is a scripting language originally designed for embedded system platforms. Since its creation, Tcl has grown far beyond its original design with numerous expansions and additions (such as the graphical Took Kit or Tk) to...

Graphics and Animation on iOS: A Beginner's Guide to Core Graphics and Core Animation
Graphics and Animation on iOS: A Beginner's Guide to Core Graphics and Core Animation

Jazz up your iPhone and iPad apps with some slick graphics and animation—and keep users from looking elsewhere. This short and concise book shows developers with even little Cocoa programming experience how to create impressive graphics and animation effects with relatively easy coding. Learn how to incorporate smooth...

Result Page: 977 976 975 974 973 972 971 970 969 968 967 966 965 964 963 962 961 960 959 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy