 |
|
|
 Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's HypervisorHyper-V is one of the top virtualization products, and this practical guide focuses on the essentials of Windows Server 2008 Hyper-V. Written by the Microsoft team behind the Hyper-V product, this book shows you how to perform key virtualization scenarios, such as server consolidation, software test and development, and a dynamic data center and... |  |  Mastering System Center Configuration Manager 2007 R2Mastering System Center Configuration Manager 2007 provides intermediate and advanced coverage of all aspects of the product, including planning and installation, upgrading Systems Management Server 2003, deploying software and operating systems, security, monitoring and troubleshooting, and automating and customizing SCCM 2007 with scripts. ... |  |  Multiwavelength Optical Networks: Architectures, Design, and Control"The rationale for the second edition is solid, and the proposed changes are extensive and comprehensive, covering the most important advances in the field since the first edition was published. The authors' credentials are impeccable. I used the first edition extensively, both as a reference for my research and for my graduate course on... |
|
|
 Security Engineering: A Guide to Building Dependable Distributed Systems"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier
"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,... |  |  Cisco ASA Configuration (Networking Professional's Library)Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of... |  |  Field Confirmation Testing for Suspicious SubstancesFrequently a substance found at a port of entry, waste site, laboratory triage facility, or even in a hazardous materials emergency will be labeled and purportedly identified. But law enforcement and other first responders cannot take this claim at face value, as the accuracy is not confirmed and must be verified. A comprehensive handbook for... |
|
| Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |