 |
|
|
|
 |  |  Information Security: Principles and Practice
Now updated—your expert guide to twenty-first century information security
Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data.... |  |  Hadoop Cluster Deployment
Construct a modern Hadoop data platform effortlessly and gain insights into how to manage clusters efficiently
Overview
-
Choose the hardware and Hadoop distribution that best suits your needs
-
Get more value out of your Hadoop cluster with Hive, Impala, and Sqoop
-
Learn useful...
|
|
 Learning Microsoft Windows Server 2012 Dynamic Access Control
When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.
Overview
-
Understand the advantages of using Dynamic Access Control and how it...
|  |  Advanced Linux NetworkingWith an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful... |  |  Information Security : Principles and PracticeYour expert guide to information security
As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not... |
|
 |  |  Red Hat: The Complete Reference Enterprise Linux & Fedora EditionMaximize the powerful capabilities of Red Hat Enterprise and Fedora Linux using this comprehensive and up-to-date reference. You'll get full details on everything from installation and configuration to system administration and server management of Enterprise Linux-with specifics on the Linux Kernel 2.6. Thorough security coverage... |  |  Kerberos: The Definitive GuideKerberos is a sophisticated network authentication system—one that has been publicly available since 1989 and provides that eternal holy grail of network administrators, single-sign-on. Yet, in that intervening decade, documentation on Kerberos has been notably lacking. While many large organizations and academic institutions have enjoyed the... |
|
 Portable DBA: SQL ServerCarry essential SQL Server administration information and troubleshooting techniques along with you so you can handle a wide variety of tasks on the spot. This handy resource offers fast access to administrative commands, syntax diagrams, error resolutions, best practices, and more. With coverage of the most commonly used SQL Server... |  |  Spring Security 3.1
Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to... |  |  Active Directory Cookbook
Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service.
... |
|
|
Result Page: 4 3 2 1 |