Home | Amazing | Today | Tags | Publishers | Years | Search 
Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
The Innovative CIO: How IT Leaders Can Drive Business Transformation
The Innovative CIO: How IT Leaders Can Drive Business Transformation

“Does your organization fumble when it comes to innovation? ‘The Innovative CIO’ presents a pragmatic guide to overcoming the 10 ‘innovation killers’ within your company.”  --Dennis McCafferty “CIO Insight”, 1/23/2013...

Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...

Hands-on Guide to the Red Hat Exams: RHCSA and RHCE Cert Guide and Lab Manual
Hands-on Guide to the Red Hat Exams: RHCSA and RHCE Cert Guide and Lab Manual

Master every topic on Red Hat’s new RHCSA™ and RHCE® exams.

  • Assess your knowledge and focus your learning.
  • Get the practical workplace knowledge you need!

 

Start-to-finish RHCSA™ and...

Microsoft Dynamics AX 2012 Security How-To
Microsoft Dynamics AX 2012 Security How-To

Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users' privileges and access rights. Hackers raise their awareness to hack and attack ERP systems as the information becomes the vital weapon these days. So securing your ERP is not only about internal...

Knowledge Management And Risk Strategies
Knowledge Management And Risk Strategies

This book deals with knowledge management with an emphasis on knowledge risk, i.e., a general trend of knowledge value getting shorter and becoming temporary. The shortening of knowledge value lifespan will have a profound impact on companies' employment policies, and employees' strategies for gaining knowledge. How to manage...

Biofuels for Transport: An International Perspective
Biofuels for Transport: An International Perspective
The IEA last published a book on biofuels in 1994 (Biofuels). Many developments have occurred in the past decade, though policy objectives remain similar: improving energy security and curbing greenhouse gas emissions are, perhaps more than ever, important priorities for IEA countries. And, more than ever, transportation energy...
ITIL Service Design 2011 Edition
ITIL Service Design 2011 Edition

The ITIL 2011 Editions have been updated for clarity, consistency, correctness and completeness. In order to meet current and future business requirements, ITIL Service Design provides guidance on the production and maintenance of IT policies, architectures and documents for the design of appropriate and innovative IT infrastructure services...

iPhone with Microsoft Exchange Server 2010 - Business Integration and Deployment
iPhone with Microsoft Exchange Server 2010 - Business Integration and Deployment
Have you been tasked with getting iPhones into the hands of your business executives, and need to ensure they can reliably and securely access corporate e-mail? This book will teach you what you need to know about getting Exchange 2010 set up and then help you deploy iPhones in a secure and manageable way.

...
Cfengine 3 Beginner's Guide
Cfengine 3 Beginner's Guide
This book starts off with step-by-step instructions for installing and configuring the CFEngine server and clients, and then moves on to configuring systems using CFEngine scripts. The author then walks you through the policy decision flow as well as conducting system and security audits.

This is followed by
...
America's Secret Establishment: An Introduction to the Order of Skull & Bones
America's Secret Establishment: An Introduction to the Order of Skull & Bones
The book began with an anonymous donation to the author of an 8-inch package of documents in the early 1980s. Nothing less than the membership list and supporting documents for a truly secret society the Yale Skull and Bones.

The late Johnny Johnson, of Phoenix Arizona was the spark that moved me to write first a
...
Managing Oracle Fusion Applications (Oracle Press)
Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole new level. Whether you’re in the IT department, a systems integrator, a business leader, or an end user, Fusion Applications has more of what you need, less of what you don’t, and some of what you didn’t even think possible.
...
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy