Home | Amazing | Today | Tags | Publishers | Years | Search 
The Definitive Guide to SUSE Linux Enterprise Server 12
The Definitive Guide to SUSE Linux Enterprise Server 12

The Definitive Guide to SUSE Linux Enterprise Server 12 is a task-oriented book designed for self-study as well as classroom environments, which will also serve you as a reference guide. The book covers all skills that system administrators typically need to posses to administer SUSE Linux Enterprise Server in corporate environments....

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

Microsoft SQL Server 2008 Management and Administration
Microsoft SQL Server 2008 Management and Administration

SQL Server 2008 is Microsoft’s latest data platform providing data management and analytical solutions for the enterprise. The platform is trusted, ensures business continuity, and is more predictable and more scalable than ever before. Although similar to SQL Server 2005, SQL Server 2008 offers a tremendous number of new features and...

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security,...

Hardening Cisco Routers (O'Reilly Networking)
Hardening Cisco Routers (O'Reilly Networking)

Master one single topic, and everything becomes clearer.

The field of network security is a huge subject. To be a network security expert, you must be an expert on routers, switches, hubs, firewalls, intrusion detection systems (IDS), servers, desktops, email, HTTP, instant messages, sniffers, and a thousand other topics. There are...

System Center Operations Manager (OpsMgr) 2007 R2 Unleashed
System Center Operations Manager (OpsMgr) 2007 R2 Unleashed

This up-to-the-minute supplement to System Center Operations Manager 2007 Unleashed brings together practical, in-depth information about System Operations Manager 2007, including major enhancements introduced with the R2 release, as well as essential information on other products and technologies OpsMgr integrates...

Microsoft Windows 7 Unleashed
Microsoft Windows 7 Unleashed

Covers Release Candidate of Windows 7. 

With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.

 

Microsoft® Windows 7 Unleashed...

Windows Server 2008: The Definitive Guide
Windows Server 2008: The Definitive Guide
This practical guide has exactly what you need to work with Windows Server 2008. Inside, you'll find step-by-step procedures for using all of the major components, along with discussions on complex concepts such as Active Directory replication, DFS namespaces and replication, network access protection, the Server Core edition, Windows PowerShell,...
GNU/Linux Application Programming (Programming Series)
GNU/Linux Application Programming (Programming Series)
GNU/Linux is the Swiss army knife of operating systems. You’ll find it in the smallest devices (such as an Apple iPod) to the largest most powerful supercomputers (like IBM’s Blue Gene). You’ll also find GNU/Linux running on the most diverse architectures, from the older x86 processors to the latest cell processor that powers the...
Ultrasonic Processes and Machines: Dynamics, Control and Applications (Foundations of Engineering Mechanics)
Ultrasonic Processes and Machines: Dynamics, Control and Applications (Foundations of Engineering Mechanics)
This work presents the foundations of dynamic and control for ultrasonic processing systems.This book considers ultrasonic systems as special vibratory machines that function by exploiting nonlinear dynamic processes. Recommendations are given for designing and tuning ultrasonic machines. The ultrasonic machines analysed are predominantly concerned...
Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
The main purpose of the present manuscript addresses the development of techniques for the evaluation and the hardening of designs implemented on SRAM-based Field Programmable Gate Arrays against the radiation induced effects such as Single Event Upsets (SEUs) or Soft-Errors (SEs). The perspective of the analysis and the design flows proposed in...
Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy