Home | Amazing | Today | Tags | Publishers | Years | Search 
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
Installing and Administering Linux, Second Edition
Installing and Administering Linux, Second Edition
An indispensable working resource for IT professionals moving to Linux-based network systems

More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand...

IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
No two data quality projects are the same. Some are large efforts focused entirely on improving some quality aspect of information. Others are subprojects within other efforts, such as a data migration. Still others are led by a few individuals trying to make a difference as they perform their everyday activities. What I like about McGilvray's Ten...
VMware ESX Essentials in the Virtual Data Center
VMware ESX Essentials in the Virtual Data Center
The VMware ESX server is vital to virtualization methods used to perform server consolidation, software development, test automation, legacy Windows migration, and more. Server virtualization can drastically cut business costs, and considering that there are few experts in the field, VMware ESX Essentials in the Virtual Data...
Deploying and Administering Windows Vista Bible
Deploying and Administering Windows Vista Bible
Although analysts expect the majority of enterprises to tread slowly into migration, there certainly will be early adopters, as there are with any system or device. Because Microsoft has announced that it will support Windows 2000 only until the year 2010, enterprises using older versions of Windows will not have much time for leisurely testing and...
Advances in Cancer Research, Volume 101 (Advances in Cancer Research)
Advances in Cancer Research, Volume 101 (Advances in Cancer Research)
Praise for the Serial:
"This classic and essential series presents critical overviews on select aspects of both cancer research and the basic underlying sciences."
-- American Scientist

"Excellent, highly informative, in-depth reviews...expertly written, up-to-date, and well-referenced."
-- Journal of
...
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

...

Modelling Urban Development with Geographical Information Systems and Cellular Automata
Modelling Urban Development with Geographical Information Systems and Cellular Automata
Urban development and migration from rural to urban areas are impacting prime agricultural land and natural landscapes, particularly in the less developed countries. These phenomena will persist and require serious study by those monitoring global environmental change. To address this need, various models have been devised to analyze urbanization...
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
Widely adopted by service providers to enable IP telephony, instant messaging, and other data services, SIP is the signaling protocol of choice for advanced multimedia communications signaling. Compiled by noted engineering experts Syed Ahson and Mohammad Ilyas, SIP Handbook: Services, Technologies, and Security of Session Initiation...
Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
Pro Mapping in BizTalk Server 2009 (Expert's Voice in BizTalk)
Pro Mapping in BizTalk Server 2009 (Expert's Voice in BizTalk)
Learn good map design techniques for BizTalk Server and you will make huge differences to the processing speed of your implementation, as well as to the scalability and maintainability of your code. Regardless of your experience, expert authors Jim Dawson and John Wainwright ensure you make the right choices to...
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy