Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)
Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system’s security infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003...

Organizational Communication and Sustainable Development: Icts for Mobility (Premier Reference Source)
Organizational Communication and Sustainable Development: Icts for Mobility (Premier Reference Source)
In this book, three different but converging processes are investigated; sustainable development, globalization and technical development. Each process is complicated and multi-faceted, but here, their mutual interaction, effects and possibilities have gained attention and interest.

“Sustainable development” are words of
...
Digital Electronics for Musicians
Digital Electronics for Musicians

This is the perfect book for musicians who want to dive into the world of computer music and physical computing. This book is aimed at adventurous musicians who want to learn about music programming with Arduino, sensors, and Pure Data, and how to make new interfaces and even new instruments with that knowledge.

You’ll
...

Hardening Linux
Hardening Linux

Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks—before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Features include examples using Red...

GFI Network Security and PCI Compliance Power Tools
GFI Network Security and PCI Compliance Power Tools
Use GFI's Tools to Search for Vulnerabilities in Your Network!

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.
...
Linux Schnellkurs für Administratoren
Linux Schnellkurs für Administratoren
Als Bill Lubanovic und ich gerade die letzten Änderungen an diesem Buch  vornahmen, belauschte ich in unserem Cisco-Labor ein Gespräch zwischen zwei  Arbeitskollegen, die sich gerade über Linux unterhielten. Der Senior-Netzwerkguru der beiden ließ dabei eine interessante Bemerkung fallen. Er sagte, dass...
Compact and Broadband Microstrip Antennas
Compact and Broadband Microstrip Antennas

In order to meet the miniaturization requirements of portable communication equipment, researchers have given much attention recently to compact microstrip antennas. Many related compact designs with broadband dual-frequency operation, dualpolarized radiation, circularly polarized radiation, and enhanced antenna gain have been reported. Many...

VMware vSphere 5.5 Cookbook
VMware vSphere 5.5 Cookbook

A task-oriented guide with over 150 practical recipes to install, configure, and manage VMware vSphere components

About This Book

  • Explore the use of command line interface (CLI) to consistently configure the environment and automate it reasonably
  • Discover the best practices to deploy...
Microsoft System Center Enterprise Suite Unleashed
Microsoft System Center Enterprise Suite Unleashed

Microsoft System Center Enterprise Suite Unleashed is the first and only definitive real-world guide to the entire Microsoft System Center Enterprise Suite. It brings together tips, tricks, best practices, and lessons learned by top consultants who’ve deployed System Center in some of the world’s...

Learning Windows Server 2003
Learning Windows Server 2003

Getting Microsoft Windows Server 2003 up and running, either as a standalone or as part of a multi-site, multi-server network is a formidable task for anyone. O'Reilly's no-nonsense guide, Learning Windows Server 2003, 2nd Edition, gives you just what you need to get the job done. It provides you...

Oracle Data Guard 11gR2 Administration Beginner's Guide
Oracle Data Guard 11gR2 Administration Beginner's Guide

If you're an Oracle Database Administrator it's almost essential to know how to protect and preserve your data. This is the perfect primer to Data Guard that covers all the bases with a totally practical, user-friendly approach.

Overview

  • Understand the essentials and components of Oracle Data...
Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering
Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering

As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling,...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy