Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Understand the fundamental factors of data storage system performance and master an essential analytical skill using block trace via applications such as MATLAB and Python tools. You will increase your productivity and learn the best techniques for doing specific tasks (such as analyzing the IO pattern in a quantitative way, identifying...
Active Directory Cookbook
Active Directory Cookbook

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service.

...

Mastering Active Directory for Windows Server 2008
Mastering Active Directory for Windows Server 2008
Detailed Coverage of Active Directory for Windows Server 2008, 2003, 2003 R2, and 2000

If you are responsible for the day-to-day operations of Active Directory, you need this book. From Windows Server 2000 up through the new features available in Windows Server 2008, this comprehensive guide gives you the practical...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Windows 10 Troubleshooting (Windows Troubleshooting Series)
Windows 10 Troubleshooting (Windows Troubleshooting Series)

Learn how to troubleshoot Windows 10 the way the experts do, whatever device or form-factor you’re using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, the solution, and the tools required. Discover the connections between the...

Data Protection
Data Protection

This is the fundamental truth about data protection: backup is dead.

Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.

So what is data...

The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)
The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)

The digital revolution is in full force but many public and private sector leaders are stymied: How can they maximize the full potential of digital technology? This hesitancy puts a brake on the transformational power of digital technology and means private companies and governmental bodies fall well behind other digital pioneers....

Low Impact Building: Housing using Renewable Materials
Low Impact Building: Housing using Renewable Materials

This guide to the designs, technologies and materials that really make green buildings work will help architects, specifiers and clients make informed choices, based on reliable technical information. Low Impact Building: Housing using Renewable Materials is about changing the way we build houses to reduce their 'carbon' footprint and...

Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

The Internet of Things: Key Applications and Protocols
The Internet of Things: Key Applications and Protocols

An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use...

Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

Result Page: 68 67 66 65 64 63 62 61 60 59 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy