|
|
|
|
InfoSecurity 2008 Threat AnalysisAn all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess... | | VHDL Coding and Logic Synthesis with SynopsysUnlike many other available references, this book is written specifically with practicality in mind. It has over 60 practical examples to help the reader learn how very high-speed integrated hardware description language (VHDL) coding and synthesis can be performed. Starting from simple VHDL coding, the book progresses to complicated, real-world... | | |
|
Learning Puppet Security
Secure your IT environments with the powerful security tools of Puppet
About This Book
-
Pass a compliance audit by showing the concrete state of your systems using Puppet
-
Secure your Puppet server to minimize risks associated with misconfigured installations using the gdsoperations/auditd...
| | Pro SQL Server 2008 Policy-Based Management
Pro SQL Server 2008 Policy-Based Management is critical for database administrators seeking in-depth knowledge on administering servers using the new policy-based management features introduced in SQL Server 2008. This book will cover everything from a basic introduction to policy-based management to creating your own custom policies... | | FreeBSD Device Drivers: A Guide for the Intrepid
Welcome to FreeBSD Device Drivers! The goal of this book is to help you improve your understanding of device drivers under FreeBSD. By the time you finish this book, you should be able to build, configure, and manage your own FreeBSD device drivers.
This book covers FreeBSD version 8, the version recommended for production ... |
|
|
Digital Design and Computer Architecture, Second Edition
Digital Design and Computer Architecture takes a unique and modern approach to digital design. Beginning with digital logic gates and progressing to the design of combinational and sequential circuits, Harris and Harris use these fundamental building blocks as the basis for what follows: the design of an actual MIPS processor.... | | IT Compliance and Controls: Best Practices for ImplementationPraise for IT Compliance and Controls
"James DeLuccia outlines a comprehensive, integrated strategy for achieving regulatory and legislative compliance. This approach is vastly superior, both in scalability and in sustainability, to the siloed compliance strategies that are often seen." —Dr. Richard Reiner, founder,... | | PCI Bus Demystified, Second Edition (Demystifying Technology Series)The peripheral component interconnect (PCI) bus is the dominant bus system used to connect the different elements making up today's high-performance computer systems. Different PCI implementations have also been developed for such applications as telecommunications and embedded computing. If an application calls for high speed, high reliability,... |
|
|
Result Page: 4 3 2 1 |