Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Messaging with Microsoft  Exchange Server 2003
Secure Messaging with Microsoft Exchange Server 2003

Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...

High-Impact Human Capital Strategy: Addressing the 12 Major Challenges Today's Organizations Face
High-Impact Human Capital Strategy: Addressing the 12 Major Challenges Today's Organizations Face

Traditionally, human resources has focused on recruiting good people, preparing them for assignments, motivating them to perform, and retaining them. These functions remain essential, but to be successful in turbulent times like ours, human capital strategy needs to be broader and much more far-reaching. High-Impact Human Capital Strategy...

Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)

Inside Java(TM) 2 Platform Security, the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java...

Debian 7: System Administration Best Practices
Debian 7: System Administration Best Practices

Learn the best ways to install and administer a Debian Linux distribution

Overview

  • An in-depth look at Debian administration subjects
  • Discover what distinguishes Debian from other Linux distributions
  • Learn how to install, maintain, and administer Debian Linux

...

Translational Neuroscience: A Guide to a Successful Program
Translational Neuroscience: A Guide to a Successful Program

Translational research looks to take the latest innovations made in the laboratory setting to translate findings into effective and sustainable medical interventions and improved preventative measures. Funding support is increasingly tied to practical healthcare outcomes, with this trend likely only to increase in coming years,...

Color Constancy (The Wiley-IS&T Series in Imaging Science and Technology)
Color Constancy (The Wiley-IS&T Series in Imaging Science and Technology)
A human observer is able to recognize the color of objects irrespective of the light used to illuminate the objects. This ability is called color constancy. In photography, color constancy is known under the name white balance. Most amateur photographers have probably experienced the following problem at one time or another when a photograph is...
SAP HANA Starter
SAP HANA Starter

SAP HANA is SAP's in-memory database technology, and the focal point of their next generation strategy. Using column-based storage to provide highly compressed and rapidly accessed data, a SAP HANA application can be several hundred times faster than the same application on previous generation database technology.

SAP HANA...

Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001)...
A Cell Biologist's Guide to Modeling and Bioinformatics
A Cell Biologist's Guide to Modeling and Bioinformatics
A step-by-step guide to using computational tools to solve problems in cell biology

Combining expert discussion with examples that can be reproduced by the reader, this text introduces an array of informatics tools that are available for analyzing biological data and modeling cellular processes. You learn to fully leverage public databases and...

Basic Math and Pre-Algebra For Dummies
Basic Math and Pre-Algebra For Dummies

Tips for simplifying tricky operations

Get the skills you need to solve problems and equations and be ready for algebra class

Whether you're a student preparing to take algebra or a parent who wants to brush up on basic math, this fun, friendly guide has the tools you need to get in gear. From positive,
...

IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)
IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)

In 1862, the gardener James Bateman sent several specimens of the Christmas orchid to Charles Darwin. This orchid was first planted in Britain in 1855 and it did not blossom until 1857. It had been discovered several decades before by the French botanist Louis-Marie Aubert du Petit-Thouars in Madagascar in 1822. The most significant...

Agile IT Security Implementation Methodology
Agile IT Security Implementation Methodology

Agile methodologies attack risk at its core. To identify risk early and often is the premise of agile security. Risk comes in many forms. Organizations face security threats every day. Risks are in the delivery and maintenance of the countermeasures. Agile IT Security focuses on the details of the steps in delivering and maintaining...

unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy