Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management

Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in...

Preventing Web Attacks with Apache
Preventing Web Attacks with Apache

The only end-to-end guide to securing Apache Web servers and Web applications

Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....

Microsoft Exchange Server 2013 PowerShell Cookbook: Second Edition
Microsoft Exchange Server 2013 PowerShell Cookbook: Second Edition

Benefit from over 120 recipes that tackle the everyday issues that arise with Microsoft Exchange Server. Using PowerShell you'll learn to add scripts that provide new functions and efficiencies. Only basic knowledge required.

Overview

  • Newly updated and improved for Exchange Server 2013 and PowerShell...
Microsoft Sql Server 7.0 Database Implementation Training Kit
Microsoft Sql Server 7.0 Database Implementation Training Kit
This training teaches IS professionals and SQL developers how to implement database solutions using the latest version of the Microsoft SQL Server relational database management system. Students will gain an understanding of the product's architecture and, through the accompanying labs, attain hands-on experience with the procedures to plan,...
Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's New Command Shell
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's New Command Shell

Do you know how to use Windows PowerShell to navigate the filesystem and manage files and folders? Or how to retrieve a web page? This introduction to the PowerShell language and scripting environment provides more than 430 task-oriented recipes to help you solve the most complex and pressing problems, and includes more than 100...

Java 9 Revealed: For Early Adoption and Migration
Java 9 Revealed: For Early Adoption and Migration
Explore the new Java 9 modules, SDK, JDK, JVM, JShell and more in this comprehensive book that covers what’s new in Java 9 and how to use these new features. Java 9 Revealed is for experienced Java programmers looking to migrate to Java 9.  Author Kishori Sharan begins by covering how to develop Java...
Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition
Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition

Build customized solutions that fulfil your business requirements using the latest features of Jira 8

Key Features

  • Learn how to customize Jira applications to suit your organizational requirements
  • Extend Jira's capabilities for custom integrations with other products...
High Performance MySQL
High Performance MySQL
In High Performance MySQL you will learn about MySQL indexing and optimization in depth so you can make better use of these key features. You will learn practical replication, backup, and load-balancing strategies with information that goes beyond available tools to discuss their effects in real-life...
Mastering Windows Server 2003
Mastering Windows Server 2003
The Only Windows Server Resource You Need

The single most comprehensive and understandable book on the subject, Mastering Windows Server 2003 continues author Mark Minasi's award-winning tradition of clear and comprehensive coverage of Microsoft's Windows Server products. This book shows you how to plan, configure and install
...
Web Mining: :  Applications and Techniques
Web Mining: : Applications and Techniques
Web mining is moving the World Wide Web toward a more useful environment in which users can quickly and easily find the information they need. It includes the discovery and analysis of data, documents, and multimedia from the World Wide Web. Web mining uses document content, hyperlink structure, and usage statistics to assist users in meeting their...
Beyond Bullets: Creative Journaling Ideas to Customize Your Personal Productivity System
Beyond Bullets: Creative Journaling Ideas to Customize Your Personal Productivity System

FUN, COLORFUL, AND CREATIVE SUGGESTIONS FOR THE NEWEST PRODUCTIVITY PHENOMENON.

Going beyond basic tools, this book offers tips, tricks and creative ways to transform your notebook into a treasured life companion, including:

• Ornamental lettering
• Personalized habit trackers...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy