|
|
|
|
The Courageous Follower: Standing Up to and for Our Leaders (2nd Edition)This updated edition of a modern classic on followership provides the keys to creating an environment in which leaders are vigorously supported in pursuing the organization’s mission and courageously confronted when their actions threaten the organization’s well-being.
For every leader there are dozens of followers who work... | | Hack I.T.: Security Through Penetration TestingPenetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from... | | Red Hat Enterprise Linux 5 Administration UnleashedThis comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.
Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and... |
|
|
|
Check Point Next Generation Security AdministrationCheck Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check... | | Studio Recording ProceduresHIT FACTORY RECORDING ENGINEER MIKE SHEA REVEALS THE SECRETS OF INCREDIBLE SOUND Only this unique guide teaches all the pros' secret techniques for creating amazing sound in the recording studio. This unique text brings recording studio equipment to life -- and shows you how to use it to create high-quality recordings,... | | |
|
|
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 |