Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Overview

  • Learn sample forms and process flows for quick and easy use.
  • An easy-to-follow reference for implementing information security in the enterprise.
  • Learn...
Sustainable Tunneling and Underground Use: Proceedings of the 2nd GeoMEast International Congress and Exhibition on Sustainable Civil Infrastructures, ... Interaction Group in Egypt (SSIGE)
Sustainable Tunneling and Underground Use: Proceedings of the 2nd GeoMEast International Congress and Exhibition on Sustainable Civil Infrastructures, ... Interaction Group in Egypt (SSIGE)
This volume comprises a set of high-quality, refereed papers that address the different aspects related to the geotechnical and structural design and construction of deep excavations, tunnels and underground space facilities as well as the effect of their construction on the surroundings. The papers cover planning, design, modeling, monitoring...
LAN Wiring
LAN Wiring
250+ detailed illustrations

The bestselling, state-of-the-art guide to cable installation for voice and data revised and updated to reflect the very latest advances and standards

Packed with essential time- and trouble-saving information, and written by a 25-year cabling veteran, LAN...

EJB Cookbook
EJB Cookbook
All but two recipes in this book are based on the EJB 2.0 specification. The recipes on creating EJB web service endpoints and the EJB timer service are based on the EJB 2.1 specification. In a few chapters, the book covers other technologies or frameworks where appropriate. In fact, this book makes use of XDoclet, log4j, Ant, and Cactus. For...
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
Exam 98-365: MTA Windows Server Administration Fundamentals (Microsoft Official Academic Course)
Exam 98-365: MTA Windows Server Administration Fundamentals (Microsoft Official Academic Course)

Welcome to the Microsoft Official Academic Course (MOAC) program for Windows Server Administration Fundamentals. MOAC represents the collaboration between Microsoft Learning and John Wiley & Sons, Inc. publishing company. Microsoft and Wiley teamed up to produce a series of textbooks that deliver compelling and innovative teaching...

Getting Started with Oracle Event Processing 11g
Getting Started with Oracle Event Processing 11g

Create and develop real-world scenario Oracle CEP applications

Overview

  • A unique insight and fascinating event driven journey that breathes life into Oracle Event Processing.
  • Explore the evolution and major capabilities of this innovative Oracle product in a step by step, building block...
Statistical and Computational Techniques in Manufacturing
Statistical and Computational Techniques in Manufacturing

In recent years, interest in developing statistical and computational techniques for applied manufacturing engineering has been increased. Today, due to the great complexity of manufacturing engineering and the high number of parameters used, conventional approaches are no longer sufficient. Therefore, in manufacturing, statistical and...

Teleophthalmology
Teleophthalmology

This book explains technical issues, digital imaging, and offers collective experiences of practitioners in different parts of the world practicing a wide range of teleophthalmology applications. It is the first book in ophthalmology covering this hot topic. The book encompasses access to specialist eye care for remote patients. It also...

Cisco Unity Fundamentals
Cisco Unity Fundamentals

A comprehensive introduction to deploying, configuring, and maintaining Cisco Unity

  • Discover the various Cisco Unity integration and deployment solutions, as well as the environmental differences between PBX and IP telephony-based telephone systems

  • ...
BizTalk 2010 Recipes: A Problem-Solution Approach (Expert's Voice in BizTalk)
BizTalk 2010 Recipes: A Problem-Solution Approach (Expert's Voice in BizTalk)

By the time you’re reading this in a bookstore, BizTalk will have celebrated its tenth birthday. Over the past decade, there have been seven releases of Microsoft’s enterprise integration server, and it has become the most broadly deployed integration middleware technology in the industry, with over 10,000 customers worldwide....

VMware vSphere 5 Clustering Technical Deepdive
VMware vSphere 5 Clustering Technical Deepdive

** Black & White edition ** VMware vSphere 5 Clustering Technical Deepdive zooms in on three key components of every VMware based infrastructure and is by no means a "how to" guide. It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it...

unlimited object storage image
Result Page: 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy