Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Configuring Check Point NGX VPN-1/Firewall-1
Configuring Check Point NGX VPN-1/Firewall-1
Check Point FireWall-1 came out in 1994 and was an immediate success. It has been
the market-leading firewall platform for over 10 years. It is no wonder the platform
has done so well.The Check Point Graphical User Interface for managing firewall
policies is extremely intuitive and easy to learn.

Check Point has come a
...
SOA Governance
SOA Governance

SOA Governance is the key to a successful adoption of Service-Oriented Architecture. It is the process of establishing a desired outcome for your efforts, and then leveraging people, policies, and processes to make that outcome a reality. This includes technical policies and standards that guide your design-time activities, policies and...

Hands-on Guide to the Red Hat Exams: RHCSA and RHCE Cert Guide and Lab Manual
Hands-on Guide to the Red Hat Exams: RHCSA and RHCE Cert Guide and Lab Manual

Master every topic on Red Hat’s new RHCSA™ and RHCE® exams.

  • Assess your knowledge and focus your learning.
  • Get the practical workplace knowledge you need!

 

Start-to-finish RHCSA™ and...

Instant Varnish Cache How-to
Instant Varnish Cache How-to

Hands-on recipes to improve your website's load speed and overall user experience with Varnish Cache

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  • Connect and health-check application servers with Varnish Cache.
  • ...
Fundamentals of Wireless Communication Engineering Technologies
Fundamentals of Wireless Communication Engineering Technologies

A broad introduction to the fundamentals of wireless communication engineering technologies

Covering both theory and practical topics, Fundamentals of Wireless Communication Engineering Technologies offers a sound survey of the major industry-relevant aspects of wireless communication engineering technologies. Divided...

Microsoft Windows security inside out for Windows XP and Windows 2000
Microsoft Windows security inside out for Windows XP and Windows 2000
Hey, you know your way around a desktop-so now dig into the Windows operating system and really put its security features to work! Covering Windows XP Professional, Windows XP Home Edition, and Windows 2000 Professional, this supremely organized reference packs hundreds of timesaving solutions, checklists, troubleshooting tips, and workarounds-all...
Markov Chains and Stochastic Stability (Cambridge Mathematical Library)
Markov Chains and Stochastic Stability (Cambridge Mathematical Library)
'This second edition remains true to the remarkable standards of scholarship established by the first edition ... it will no doubt be a very welcome addition to the literature.' Peter W. Glynn, Prologue to the Second Edition

Meyn & Tweedie is back! The bible on Markov chains in general state spaces has been brought up to
...
Training Guide: Administering Windows Server 2012
Training Guide: Administering Windows Server 2012

Designed to help enterprise administrators develop real-world, job-role-specific skills—this Training Guide focuses on deploying and managing Windows Server 2012. Build hands-on expertise through a series of lessons, exercises, and suggested practices—and help maximize your performance on the job.

This...

The Business and Practice of Coaching: Finding Your Niche, Making Money, & Attracting Ideal Clients
The Business and Practice of Coaching: Finding Your Niche, Making Money, & Attracting Ideal Clients

Building a thriving coaching business is a challenge.

An estimated 30,000 coaches have entered the coaching profession during the past five years. Unfortunately, the majority report they are unable to earn a living wage from their coaching services. Competition is high, and the knowledge of how to succeed in the...

Integrated Community-Managed Development: Strategizing Indigenous Knowledge and Institutions for Poverty Reduction and Sustainable Community Development in Indonesia (Cooperative Management)
Integrated Community-Managed Development: Strategizing Indigenous Knowledge and Institutions for Poverty Reduction and Sustainable Community Development in Indonesia (Cooperative Management)
This book provides an overview of recent advances in Integrated Community-Managed Development (ICMD) as an innovative strategy for the community-based development of local institutions in order to achieve lasting poverty reduction and empowerment. The original approach presented here to improving the lives and livelihoods of the poor takes...
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
The marriage of computers and telecommunications, the integration of these technologies into a multimedia system of communication that has global reach, and the fact that they are available worldwide at low cost seems to be bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may...
Juniper and Cisco Routing: Policy and Protocols for Multivendor Networks
Juniper and Cisco Routing: Policy and Protocols for Multivendor Networks
Obtain a clear understanding of how routing information and traffic flows on a multivendor network

Routing policies for networks are often complex and not well understood. Many books detail the operation of routing protocols such as OSPF or BGP, but none place the protocols in the context of routing policies and the real world of ISP peering...

unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy