** Black & White edition ** VMware vSphere 5 Clustering Technical Deepdive zooms in on three key components of every VMware based infrastructure and is by no means a "how to" guide. It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it...
The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...
BlackBerry Enterprise Server is a platform that extends corporate messaging and collaboration services to BlackBerry devices. It supports management and administration of devices, and also supports deployment of third-party applications on the BlackBerry device platform. The basics of installing BlackBerry Enterprise Server are familiar for...
Audit and Trace Log Management: Consolidation and Analysis
is both a timely and much needed compilation of useful information around a topic
that is becoming more and more critical to not only IT professionals and
security practitioners, but to many other departments, such as legal, risk,
and compliance, as well as auditors and...
With more than 500 million active users around the world and still growing steadily, Facebook is more than just another social media site. In the words of author Dave Awl, Facebook is “the new town square”—the place where people gather to discuss the news of the day as well as share what’s going on in their lives. And...
Every new version of SQL Server brings with it new tools and features for database administrators (DBAs), developers, and architects, for them to be able to provide an effective solution for the end users in a simpler and more efficient manner. The terms effective and efficiency can be measured in a technical perspective as High Availability...
Information security has become a critical component in the stability and progress
of the modern world. With high expectations from the public and stringent regulations
from legislative and industry bodies, never have the pressures on corporations,
governments and other organizations been so great to protect their own data as well
as...
Welcome to the official Mac OS X Server Essentials training course offered
by Apple Computer. This book serves as a self-paced guide and is designed
to help you build the basic skills you need to effectively administer Mac
OS X Server. Apple Training Series: Mac OS X Server Essentials details the
graphical tools that Apple provides to...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
There is a scientific consensus that we need to act rapidly to
cut carbon dioxide emissions if we are to limit the most
extreme effects of climate change. The IT sector is in a
unique position to act as a catalyst for this change. By
implementing simple efficiencies, the sector can reduce its
carbon footprint – which currently...
Written by CompTIA certification and training expert Mike Meyers, this instructive, full-color guide will help you pass the CompTIA A+ exams and become an expert hardware technician. Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Third Edition is...
The Definitive Guide to Governing Shared Services and SOA Projects
SOA Governance: Governing Shared Services On-Premise and in the Cloud is the result of a multi-year project to collect proven industry practices for establishing IT governance controls specific to the adoption of SOA...