Home | Amazing | Today | Tags | Publishers | Years | Search 
Linux Firewalls (3rd Edition)
Linux Firewalls (3rd Edition)
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most...
Building Customer-Based Project Organizations
Building Customer-Based Project Organizations
How to Ensure That the Customer Is Truly Your Number One Priority

How do winning organizations such as General Electric, Ericsson, and Nokia use project management to reduce time to market, trim inventory and supplier costs, and minimize obsolescence in their product lines? Why do so many companies fail when trying to do the...

Building DMZs for Enterprise Networks
Building DMZs for Enterprise Networks
During the course of the last few years, it has become increasingly evident that there is
a pronounced need for protection of internal networks from the outside world. As
machine technologies have improved and extensive shifts in the functions that a user
can accomplish through more user-friendly interfaces have occurred, many more
...
Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualization: A powerful technique for achieving high performance

Complex systems do not require complex project management. The most effective project managers are able to simplify their project environment and organize projects, large and small, to achieve predictable results. This book explains how anyone responsible for a project can apply...

Configuring Check Point NGX VPN-1/Firewall-1
Configuring Check Point NGX VPN-1/Firewall-1
Check Point FireWall-1 came out in 1994 and was an immediate success. It has been
the market-leading firewall platform for over 10 years. It is no wonder the platform
has done so well.The Check Point Graphical User Interface for managing firewall
policies is extremely intuitive and easy to learn.

Check Point has come a
...
Professional InfoPath 2003
Professional InfoPath 2003
Microsoft InfoPath 2003 helps developers tackle forms-based information-gathering with the full range of XML technologies. This book quickly guides experienced Office and XML developers through InfoPath fundamentals, including XML form templates architecture, form definition file structure, available external data sources, and backend services....
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
PC Magazine - February 7 2006
PC Magazine - February 7 2006
February 7, 2006

First Looks
Envision EN7600
...
Successful Marketing Strategy for High-Tech Firms (Technology Management and Professional Development)
Successful Marketing Strategy for High-Tech Firms (Technology Management and Professional Development)
The definition of the word “marketing” can be found in its etymology.
Marketing means “putting on the market.” Therefore, the purpose of marketing
is to act in such a way that a company places on the market products
that correspond to demand and satisfy the needs and wants of customers at
an acceptable
...
Check Point NG/AI: Next Generation with Application Intelligence Security Administration
Check Point NG/AI: Next Generation with Application Intelligence Security Administration

In Check Point Next Generation with Application Security Administration you will cover the basic concepts of security and how to configure a simple firewall all the way to some very advanced VPN scenarios. This book is written by experts in the field as well as certified instructors to give the depth desired by the most advanced users,...

Windows Phone 7.5: Building Location-aware Applications
Windows Phone 7.5: Building Location-aware Applications
Windows Phone 7.5: Building Location-aware Applications, introduces you to the exciting new world of Windows Phone 7.5. This book focuses on location-based applications, by introducing the readers to location-based services and the background thereof, coupled with practical examples for the Windows Phone location services. Another...
Beginning Windows Phone App Development (Beginning Apress)
Beginning Windows Phone App Development (Beginning Apress)

This is the third edition of this book. We wanted to improve upon the first two editions and update the book with new features of the Windows Phone OS, as well as provide hands-on knowledge on how to program the plethora of features offered by Windows Phone devices.

While the second edition was being written, Microsoft and
...

Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy