|
|
|
|
Beginning Jenkins Blue Ocean: Create Elegant Pipelines With Ease
Dive deep into Jenkins Blue Ocean and discover how easy creating a pipeline can be. You’ll see how Blue Ocean provides a better user experience when designing, running, and visualizing pipelines. This book shows you its intuitive user interface and its powerful pipeline editor and how this makes it a tool for everyone. ... | | Security+ Study GuideOver 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study Guides
The Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test... | | Mastering Windows Network Forensics and InvestigationConduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this... |
|
Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | Beginning Fedora 2Beginning Fedora 2 teaches you everything you need to know in order to install, configure, use, and maintain Fedora. This book targeted primarily at readers who are using (or planning to use) the Fedora Linux operating system for the first time. It offers the simple, plain-speaking guidance you need as you begin to explore the vast... | | Securing and Controlling Cisco RoutersSecuring and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting... |
|
Pro SharePoint Disaster Recovery and High Availability
Few IT professionals take the time to learn what needs to be known to do disaster recovery well. Most labor under the pretense that good administration equals close to five-nines uptime. Most technical people do not see the value of planning for disasters until the unexpected has already happened, and the effects of a disaster involving a... | | Systems Programmer's Guide to Z/OS System LoggerThis Redbook provides system programmers with a solid understanding of the System Logger component and guidance about how it should be set up for optimum performance with each of the exploiters.
The z/OS System Logger is a function provided by the operating system to exploiters running on z/OS. The number of exploiters of... | | Web Search Engine Research (Library and Information Science)
Web Search Engine Research, edited by Dirk Lewandowski, provides an understanding of Web search engines from the unique perspective of Library and Information Science. The book explores a range of topics including retrieval effectiveness, user satisfaction, the evaluation of search interfaces, the impact of search on society, reliability of... |
|
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |