Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
VHDL Coding and Logic Synthesis with Synopsys
VHDL Coding and Logic Synthesis with Synopsys
Unlike many other available references, this book is written specifically with practicality in mind. It has over 60 practical examples to help the reader learn how very high-speed integrated hardware description language (VHDL) coding and synthesis can be performed. Starting from simple VHDL coding, the book progresses to complicated, real-world...
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...

Learning Puppet Security
Learning Puppet Security

Secure your IT environments with the powerful security tools of Puppet

About This Book

  • Pass a compliance audit by showing the concrete state of your systems using Puppet
  • Secure your Puppet server to minimize risks associated with misconfigured installations using the gdsoperations/auditd...
Pro SQL Server 2008 Policy-Based Management
Pro SQL Server 2008 Policy-Based Management

Pro SQL Server 2008 Policy-Based Management is critical for database administrators seeking in-depth knowledge on administering servers using the new policy-based management features introduced in SQL Server 2008. This book will cover everything from a basic introduction to policy-based management to creating your own custom policies...

FreeBSD Device Drivers: A Guide for the Intrepid
FreeBSD Device Drivers: A Guide for the Intrepid
Welcome to FreeBSD Device Drivers! The goal of this book is to help you improve your understanding of device drivers under FreeBSD. By the time you finish this book, you should be able to build, configure, and manage your own FreeBSD device drivers.

This book covers FreeBSD version 8, the version recommended for production
...
Upgrading and Repairing PCs (15th Edition)
Upgrading and Repairing PCs (15th Edition)

Upgrading and Repairing PCs is the runaway best-selling PC hardware book of all time and one of the best-selling computer books ever! This 15th Edition is loaded with the most up-to-date hardware information anywhere. World-renowned PC hardware expert Scott Mueller has taught thousands...

Beginning SQL Server 2008 Administration (Expert's Voice in SQL Server)
Beginning SQL Server 2008 Administration (Expert's Voice in SQL Server)

Beginning SQL Server 2008 Administration is essential for anyone wishing to learn about implementing and managing SQL Server 2008 database. From college students, to experienced database administrators from other platforms, to those already familiar with SQL Server and wanting to fill in some gaps of knowledge, this book will bring...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Digital Design and Computer Architecture, Second Edition
Digital Design and Computer Architecture, Second Edition

Digital Design and Computer Architecture takes a unique and modern approach to digital design. Beginning with digital logic gates and progressing to the design of combinational and sequential circuits, Harris and Harris use these fundamental building blocks as the basis for what follows: the design of an actual MIPS processor....

IT Compliance and Controls: Best Practices for Implementation
IT Compliance and Controls: Best Practices for Implementation
Praise for IT Compliance and Controls

"James DeLuccia outlines a comprehensive, integrated strategy for achieving regulatory and legislative compliance. This approach is vastly superior, both in scalability and in sustainability, to the siloed compliance strategies that are often seen."
—Dr. Richard Reiner, founder,
...

PCI Bus Demystified, Second Edition (Demystifying Technology Series)
PCI Bus Demystified, Second Edition (Demystifying Technology Series)
The peripheral component interconnect (PCI) bus is the dominant bus system used to connect the different elements making up today's high-performance computer systems. Different PCI implementations have also been developed for such applications as telecommunications and embedded computing. If an application calls for high speed, high reliability,...
unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy