Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition

Active Directory is a common repository for information about objects that reside on the network, such as users, groups, computers, printers, applications, and files. The default Active Directory schema supports numerous attributes for each object class that can be used to store a variety of information. Access Control Lists (ACLs) are...

Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
Learning Microsoft Windows Server 2012 Dynamic Access Control
Learning Microsoft Windows Server 2012 Dynamic Access Control

When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.

Overview

  • Understand the advantages of using Dynamic Access Control and how it...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Field Guide to Hadoop: An Introduction to Hadoop, Its Ecosystem, and Aligned Technologies
Field Guide to Hadoop: An Introduction to Hadoop, Its Ecosystem, and Aligned Technologies

If your organization is about to enter the world of big data, you not only need to decide whether Apache Hadoop is the right platform to use, but also which of its many components are best suited to your task. This field guide makes the exercise manageable by breaking down the Hadoop ecosystem into short, digestible sections....

Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Maximize the powerful capabilities of Red Hat Enterprise and Fedora Linux using this
comprehensive and up-to-date reference. You'll get full details on everything from installation and
configuration to system administration and server management of Enterprise Linux-with specifics
on the Linux Kernel 2.6. Thorough security coverage
...
Kerberos: The Definitive Guide
Kerberos: The Definitive Guide
Kerberos is a sophisticated network authentication system—one that has been publicly available since 1989 and provides that eternal holy grail of network administrators, single-sign-on. Yet, in that intervening decade, documentation on Kerberos has been notably lacking. While many large organizations and academic institutions have enjoyed the...
Portable DBA: SQL Server
Portable DBA: SQL Server

Carry essential SQL Server administration information and troubleshooting techniques along with you so you can handle a wide variety of tasks on the spot. This handy resource offers fast access to administrative commands, syntax diagrams, error resolutions, best practices, and more. With coverage of the most commonly used SQL Server...

Spring Security 3.1
Spring Security 3.1

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to...

Active Directory Cookbook
Active Directory Cookbook

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service.

...

Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Result Page: 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy