Home | Amazing | Today | Tags | Publishers | Years | Search 
Firewalls: Jumpstart for Network and Systems Administrators
Firewalls: Jumpstart for Network and Systems Administrators
Security advice for any organization from a consultant with decades of experience

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement
...
Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

PC Magazine Windows XP Solutions
PC Magazine Windows XP Solutions
In the event of system failure

Sometimes a Windows XP installation can fail to the point where you can do nothing to save it. You have a number of options open to you, such as attempting to repair the installation and, at the other extreme, reformatting all your hard drives and starting over. However, often the easiest approach is to install a...

Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
"Thought-provoking and far-sighted, this book provides a detailed analysis of the legal issues involved in on-line business and how a new generation of electronic agents can help. If you’re grappling with these issues today—or if you just want to see what’s coming tomorrow—this book is an excellent place to...
Microprocessor Theory and Applications with 68000/68020 and Pentium
Microprocessor Theory and Applications with 68000/68020 and Pentium
A self-contained introduction to microprocessor theory and applications

This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Intel® Pentium®. It begins with an overview of microprocessors—including...

Web 2.0: The Business Model
Web 2.0: The Business Model
Web 2.0 is one of the most prominent business models for information systems available today. It brings together technology and social networks, and the interactivity that creates business value.

Web 2.0: The Business Model, an edited volume, is the first reference that integrates the business implications of Web 2.0/3.0, along...

Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
In the last decade there has been a phenomenal growth in interest in crime pattern analysis. Geographic information systems are now widely used in urban police agencies throughout industrial nations. With this, scholarly interest in understanding crime patterns has grown considerably.

Artificial Crime Analysis Systems: Using Computer...

Integrating ISA Server 2006 with Microsoft Exchange 2007
Integrating ISA Server 2006 with Microsoft Exchange 2007
Everything IT pros need to know about using ISA Server 2006 to defend their companies' email and remote users from hack attacks!

This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time
...
Practical Internet Security
Practical Internet Security
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external...
Quantum Enigma: Physics Encounters Consciousness
Quantum Enigma: Physics Encounters Consciousness
The most successful theory in all of science--and the basis of one third of our economy--says the strangest things about the world and about us. Can you believe that physical reality is created by our observation of it? Physicists were forced to this conclusion, the quantum enigma, by what they observed in their laboratories.

Trying to
...
Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise
Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise

A must-have for all companies undertakingservice-oriented architecture (SOA) governance

As SOA interest and adoption have accelerated rapidly, the challenges of governance have risen to the forefront across the entire industry. Without an SOA governance model, SOA adoption is stilted and hampered by a lack of...

Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Every company needs to protect its people and other assets by managing risk in the hiring process!

Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be
...
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy