Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Vista Administration: The Definitive Guide
Windows Vista Administration: The Definitive Guide
Whether you're a system administrator responsible for hundreds of Windows clients, or a just a roomful of computers, this book will help you install, configure, and maintain Microsoft's newest OS. Written in jargon-free English that puts concepts in proper context, the book gives you a better understanding of Vista's innovations and capabilities,...
A+ Certification All-in-One Exam Guide, Sixth Edition
A+ Certification All-in-One Exam Guide, Sixth Edition
The Number-One CompTIA A+ Exam Guide

"The most comprehensive publication on the market." -Certification Magazine

Completely revised and updated for all four new exams and reviewed and approved by CompTIA, this definitive volume covers everything you need to know to pass the CompTIA A+...

Violence at Sea: Piracy in the Age of Global Terrorism
Violence at Sea: Piracy in the Age of Global Terrorism
Violence at Sea is an overview of maritime piracy, examining threats that piracy poses to global security and commerce, as well as measures and policies to mitigate the threat. The essays analyze piracy activities in key shipping lanes (including the African coast, the Arabian Sea, the Bay of Bengal, and the Straits of Malacca-South China...
As If an Enemy's Country: The British Occupation of Boston and the Origins of Revolution (Pivotal Moments in American History)
As If an Enemy's Country: The British Occupation of Boston and the Origins of Revolution (Pivotal Moments in American History)

In the dramatic few years when colonial Americans were galvanized to resist British rule, perhaps nothing did more to foment anti-British sentiment than the armed occupation of Boston. As If an Enemy's Country is Richard Archer's gripping narrative of those critical months between October 1, 1768 and the winter of 1770 when Boston was...

With Alexander in India and Central Asia: Moving East and Back to West
With Alexander in India and Central Asia: Moving East and Back to West

Alexander conquered most parts of the Western World, but there is a great deal of controversy over his invasion of India, the least known of his campaigns. In BC 327 Alexander came to India, and tried to cross the Jhelum river for the invasion, but was then confronted by King Porus who ruled an area in what is now the Punjab. According to...

Microsoft Office 2003 Editions Resource Kit
Microsoft Office 2003 Editions Resource Kit

Whether you’re a small business or a global organization, deploy and support Microsoft Office 2003 Editions with expertise direct from the Microsoft Office product team. This official Resource Kit packs the in-depth technical information you need to customize and install Office, plan and implement messaging with Microsoft...

Security Planning and Disaster Recovery
Security Planning and Disaster Recovery

Secrets and strategies for protecting your network before trouble strikes

Create and implement a successful security system and recovery plan with help from this insightful and practical resource. This detailed guide provides you with a complete roadmap for developing an effective end-to-end security program. You’ll even...

The International Handbook of Computer Security
The International Handbook of Computer Security
This book is a one-stop resource to help executives and computer professionals protect their systems and data from a myriad of internal and external threats. Addressing a wide range of security issues, it provides practical guidance on topics such as: physical security procedures * data preservation and protection * hardware and software protection...
Windows Server 2008 Unleashed
Windows Server 2008 Unleashed
Windows Server 2008 Unleashed covers the planning, design, prototype testing, implementation, migration, administration, and support of a Windows 2008 and Active Directory environment, based on more than three and a half years of early adopter experience in full production environments. This book addresses not only what is new with Windows...
Corporate Blogging For Dummies
Corporate Blogging For Dummies

Establish a successful corporate blog to reach your customers

Corporate blogs require careful planning and attention to legal and corporate policies in order for them to be productive and effective. This fun, friendly, and practical guide walks you through using blogging as a first line of communication to customers and...

OpenStack Cloud Security
OpenStack Cloud Security

Build a secure OpenStack cloud to withstand all common attacks

About This Book

  • Design, implement, and deliver a safe and sound OpenStack cluster using best practices
  • Create a production-ready environment and protect your data on the cloud
  • A step-by-step tutorial packed with...
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory

Examine what would happen if we were to deploy blockchain technology at the sovereign level and use it to create a decentralized cashless economy. This book explains how finance and economics work today, and how the convergence of various technologies related to the financial sector can help us find solutions to problems,...

unlimited object storage image
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy