Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft  Windows Server(TM) 2003 PKI and Certificate Security
Microsoft Windows Server(TM) 2003 PKI and Certificate Security
No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Microsoft Windows Server 2003! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication,...
Art of Client Service
Art of Client Service
With brevity, levity, and clarity, Robert Solomon, a well-respected advertising executive, has written a definitive and practical resource for advertising and marketing account executives. Writers, planners, researchers, and production supervisors will benefit as well from his down-to-earth advice on the care and feeding of the advertising client....
How to Cheat at Administering Office Communications Server 2007
How to Cheat at Administering Office Communications Server 2007
Microsoft Office Communications Server (OCS) 2007 is Microsofts latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP (VoIP), and audio conferencing and videoconferencing. It will work with your companys...
The Active Manager's Tool Kit : 45 Reproducible Tools for Leading and Improving Your Employee's Performance
The Active Manager's Tool Kit : 45 Reproducible Tools for Leading and Improving Your Employee's Performance
Do active managers outperform traditional managers? You bet they do. Let me tell you why.

Traditional managers are reactive. They wait for problems to occur and then try to put out the fires. In the meantime, they take care of “business as usual”—scheduling, assigning tasks, checking on employee activity, and writing
...
The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

Highly Available Storage for Windows Servers
Highly Available Storage for Windows Servers
A guide to managing online storage in Windows server environments

Managing online storage effectively is becoming an essential component of the information processing strategy as enterprises place increasing reliance on their data assets. The many online storage management options available for the Windows server environment can be bewildering...

High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
"Building networks with high performance demanded by today's applications requires a complete understanding of the basic principles and latest techniques. This book is the definitive guide to both."-Lyman Chapin

High-speed networking is the essential enabler of modern sophisticated distributed computing applications. This
...
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
A comprehensive introduction to the protocols and architecture everyone must know in order to implement H.323-based IP telephony

IP Telephony with H.323

Internet Protocol (IP) telephony is changing the way business gets done, allowing multimedia messages such as voice, data, and video to be transmitted over standard routers,...

Cics Performance Monitor Release 2 (IBM Redbooks)
Cics Performance Monitor Release 2 (IBM Redbooks)

This IBM Redbook updates the CICS PM Release 1 Redbook with enhancements that come with Release 2. Historical data capture is added, as well as additional functionality in the GUI. We also look at the enhancements of the underlying Web User Interface region. This book is intended primarily for CICS Transaction Server V2.2 customers who plan to...

Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Information Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent...
Joomla! A User's Guide: Building a Successful Joomla! Powered Website
Joomla! A User's Guide: Building a Successful Joomla! Powered Website

The First Easy-to-Use Guide to Joomla!-The World's #1 Open Source Content Management System

If you want to build sophisticated websites that can be easily edited and updated, you need to master...

Microsoft Windows Server 2008: A Beginner's Guide (Network Professional's Library)
Microsoft Windows Server 2008: A Beginner's Guide (Network Professional's Library)

Get up and running on Microsoft Windows Server 2008 with ease

This hands-on guide covers all the essentials of deploying and administering the latest release of Microsoft's powerful, versatile network operating system. Using clear screenshots and step-by-step instructions, Microsoft...

Result Page: 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy