Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

Disciplined Agile Delivery: A Practitioner's Guide to Agile Software Delivery in the Enterprise (IBM Press)
Disciplined Agile Delivery: A Practitioner's Guide to Agile Software Delivery in the Enterprise (IBM Press)

Master IBM’s Breakthrough DAD Process Framework for Succeeding with Agile in Large, Complex, Mission-Critical IT Projects

 

It is widely recognized that moving from traditional to agile approaches to build software solutions is a critical...

Persistence in PHP with Doctrine ORM
Persistence in PHP with Doctrine ORM

This book is designed for PHP developers and architects who want to modernize their skills through better understanding of Persistence and ORM. You'll learn through explanations and code samples, all tied to the full development of a web application.

Overview

  • Develop a fully functional Doctrine-backed...
CISA: Certified Information Systems Auditor Study Guide
CISA: Certified Information Systems Auditor Study Guide
Take charge of your career with certification that can increase your marketability. Demand for information systems auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification and improve your job skills with the targeted training you'll receive in this valuable book.

...

Microsoft SharePoint Server 2007 Bible
Microsoft SharePoint Server 2007 Bible
Welcome to the Microsoft SharePoint Server 2007 Bible. We are so excited about this release of the SharePoint technologies as there is a great deal that is included with this product that the realm of what is possible is enormous. Web content management, records management, workflow, and business intelligence as...
Green Tech: How to Plan and Implement Sustainable IT Solutions
Green Tech: How to Plan and Implement Sustainable IT Solutions
“Green” is a feel-good term. It has positive, earth-friendly connotations, often without much specificity—perfect for marketing purposes. Sustainability, on the other hand, is something we can measure and manage. We are sustainable when our use of resources does not permanently deplete or damage our supply, including natural...
Agile!: The Good, the Hype and the Ugly
Agile!: The Good, the Hype and the Ugly

Are you attracted by the promises of agile methods but put off by the fanaticism of many agile texts? Would you like to know which agile techniques work, which ones do not matter much, and which ones will harm your projects? Then you need Agile!: the first exhaustive, objective review of agile principles, techniques and tools.

...

Software Architecture Knowledge Management: Theory and Practice
Software Architecture Knowledge Management: Theory and Practice

A software architecture manifests the major early design decisions, which determine the system’s development, deployment and evolution. Thus, making better architectural decisions is one of the large challenges in software engineering. Software architecture knowledge management is about capturing practical experience and translating it...

Robustness Development and Reliability Growth: Value Adding Strategies for New Products and Processes
Robustness Development and Reliability Growth: Value Adding Strategies for New Products and Processes

This book integrates key tools and processes into a comprehensive program for developing more robust and reliable technology-based products. Drawing on their extensive product development experience, the authors present a complete process for ensuring product performance throughout the entire lifecycle, from understanding...

Building Cisco Remote Access Networks
Building Cisco Remote Access Networks
Citrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's...
Learning DevOps: Continuously Deliver Better Software
Learning DevOps: Continuously Deliver Better Software

Learn to use some of the most exciting and powerful tools to deliver world-class quality software with continuous delivery and DevOps

About This Book

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • ...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy