Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CompTIA Security+ All-in-One Exam Guide, Second Edition
CompTIA Security+ All-in-One Exam Guide, Second Edition

A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One

Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of...

Active Directory, Second Edition
Active Directory, Second Edition
Active Directory, 2nd Edition, provides system and network administrators, IT professionals, technical project managers, and programmers with a clear, detailed look at Active Directory for both Windows 2000 and Windows Server 2003. Active Directory, 2nd Edition will guide you through...
Mac OS X Security
Mac OS X Security
Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of...
Managing Infrastructure with Puppet
Managing Infrastructure with Puppet

This book is for anyone using or considering Puppet as a systems automation tool. Readers of this book should be familiar with Linux systems administration and basic Ruby. I’ll cover the basics of using Puppet manifests for configuration management and techniques for executing and managing those configurations with...

Hack Proofing Windows 2000 Server
Hack Proofing Windows 2000 Server
Essential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes and explains complicated architectures through experience and research. The authors include...
Practical Hadoop Security
Practical Hadoop Security

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive...

Windows Server 2003 Bible
Windows Server 2003 Bible
If Windows Server 2003 can do it, you can do it, too ...

This comprehensive reference provides what you need to plan, install, configure, and maintain a Windows Server 2003 R2, SP1, operating system. Covering critical new SP1 security features, the new Windows Update service, and expanded Active Directory...

Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

Hadoop Operations and Cluster Management Cookbook
Hadoop Operations and Cluster Management Cookbook

We are facing an avalanche of data. The unstructured data we gather can contain many insights that could hold the key to business success or failure. Harnessing the ability to analyze and process this data with Hadoop is one of the most highly sought after skills in today's job market. Hadoop, by combining the computing and storage powers...

Securing Hadoop
Securing Hadoop

Implement robust end-to-end security for your Hadoop ecosystem

Overview

  • Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
  • Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
  • ...
Official Red Hat Linux Administrator's Guide
Official Red Hat Linux Administrator's Guide

Red Hat sealed and approved! Compiled by Red Hat’s own documentation team and reviewed by a Red Hat qualified technical expert, this comprehensive, authoritative guide delivers all the know-how you need to manage Linux networks and systems, troubleshoot problems, and provide optimum client service.

You’ll find in-depth...

unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy