Home | Amazing | Today | Tags | Publishers | Years | Search 
Professional IIS 7
Professional IIS 7
Windows Server 2008 is the first update to Microsoft’s server operating system in nearly five years, and among the major changes is the new Internet Information Services 7.0, which probably marks the biggest departure from previous IIS versions that we have ever seen.

Previous recent releases of IIS have concentrated on improving
...
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans
A complete and definitive guide to auditing the security of IT systems for managers, CIOs, controllers, and auditors

This up-to-date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company's IT platforms-from the mainframe to the individual PC-as well as the networks that connect
...
Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

C: An advanced introduction (Principles of computer science series)
C: An advanced introduction (Principles of computer science series)
The C programming language was designed and implemented by Dennis Ritchie in 1972 at AT&T Bell Laboratories. Despite a late start, the popularity of C has been increasing rapidly. C compilers are now available for many machines and the list of available C compilers is growing fast [Halfant 1983, Kern 1983, Phraner 1983]. Two important reasons...
Robot Modeling and Control
Robot Modeling and Control
Robotics is a relatively young field of modern technology that crosses traditional engineering boundaries. Understanding the complexity of robots and their applications requires knowledge of electrical engineering, mechanical engineering, systems and industrial engineering, computer science, economics, and mathematics. New disciplines of...
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)

Here’s the book you need to prepare for Exam 1D0-470, CIW Security Professional. This Study Guide provides:

  • In-depth coverage of official exam objectives
  • Practical information on security concepts and practices
  • Hundreds of...
Pattern Recognition Using Neural and Functional Networks (Studies in Computational Intelligence)
Pattern Recognition Using Neural and Functional Networks (Studies in Computational Intelligence)
Biologically inspired computing is different from conventional computing. It has a different feel; often the terminology does not sound like it’s talking about machines. The activities of this computing sound more human than mechanistic as people speak of machines that behave, react, self-organize, learn, generalize, remember and even to...
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Building a PC For Dummies
Building a PC For Dummies
Got a screwdriver? You can put together your own PC!

Build the foundation, install an operating system, and add the cool stuff

You'll be amazed at how easy it can be to assemble your own PC — and how much fun you can have! This book skips the techno-talk and takes you through the process step by step. Install sound and video...

Basics of Contemporary Cryptography for IT Practitioners
Basics of Contemporary Cryptography for IT Practitioners
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques...
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

Deploying LINUX on the Desktop
Deploying LINUX on the Desktop
Covering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!

Looking at the world of the
...
Result Page: 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy