Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Server 2003: The Complete Reference
Windows Server 2003: The Complete Reference

Master new features for a more secure, easier to manage, network

The Most Comprehensive Windows Server 2003 Resource Available!

Examine the architecture and understand the features of Windows Server 2003 with help from this thorough resource. Written by respected author Kathy Ivens, Windows Server 2003: The Complete...

The CISM Prep Guide: Mastering the Five Domains of Information Security Management
The CISM Prep Guide: Mastering the Five Domains of Information Security Management

There is no better way for you to stand out from the crowd of IT professionals than to get your Certified Information Security Manager (CISM) certification from the Information Systems Audit and Control Association (ISACA). Written by the bestselling authors of the CISSP Prep Guide, this comprehensive test guide provides you with all...

Information Security Management Handbook, Fifth Edition
Information Security Management Handbook, Fifth Edition

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated...

Microsoft Windows 98 Training Kit
Microsoft Windows 98 Training Kit
At the end of the course, students will be able to: Configure the hardware, system, and software settings that comprise the Windows 98 environment. Manage hard disks in Windows 98. Install and configure a local printer. Install Windows 98 in a network environment. Configure Windows 98 network components. Implement Windows 98 on a Windows...
Wikipedia: The Missing Manual
Wikipedia: The Missing Manual
What made you write the book? In November 2006 I started working on an index for editors of Wikipedia – a single page that had links to all relevant policies, guidelines, how-to pages, reference pages, tools, and other things that an editor might conceivably want to read. The more I worked on the index, the...
International Security and the United States: An Encyclopedia (Praeger Security International)
International Security and the United States: An Encyclopedia (Praeger Security International)

Shaped by often very dramatic events, international security and the international system have changed significantly in recent years. The conclusion of the Cold War, the emergence of new political systems, the growth of significant threats such as terrorism, and the development of new security doctrines have driven global transformation. These...

Oracle SOA Governance 11g Implementation
Oracle SOA Governance 11g Implementation

Being able to implement SOA governance competently can make a huge difference to your organization's efficiency. This guide shows you how through a complete practical course based on Oracle's highly regarded software suite.

Overview

  • Understand SOA governance including its key concepts, goals, and...
Implementing Homeland Security for Enterprise IT
Implementing Homeland Security for Enterprise IT

The September 11, 2001 attacks illustrated the immense vulnerability to terrorist threats. Since there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships...

China's Drug Practices and Policies: Regulating Controlled Substances in a Global Context
China's Drug Practices and Policies: Regulating Controlled Substances in a Global Context

In the context of global efforts to control the production, distribution, and use of narcotic drugs, China's treatment of the problem provides an important means of understanding the social, political, and economic limits of national and international policies to regulate drug practices. In the nineteenth and early twentieth centuries, China was...

Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills

A step-by-step guide to the tasks involved in security administration

If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you...

Professional Azure SQL Database Administration: Equip yourself with the skills you need to manage and maintain your SQL databases on the Microsoft cloud
Professional Azure SQL Database Administration: Equip yourself with the skills you need to manage and maintain your SQL databases on the Microsoft cloud

Discover how you can migrate a traditional on-premise SQL server database to a cloud-based solution with Microsoft Azure. Built with database administrators in mind, this book emulates different scenarios you might come across while working with large, complex SQL database migrations and provides solutions for effectively managing...

GFI Network Security and PCI Compliance Power Tools
GFI Network Security and PCI Compliance Power Tools
Use GFI's Tools to Search for Vulnerabilities in Your Network!

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.
...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy