Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security: A Beginner's Guide, Second Edition
Network Security: A Beginner's Guide, Second Edition
Essential Skills--Made Easy!

Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack...

Pro BizTalk 2009
Pro BizTalk 2009

In the beginning, when BizTalk was still in its infancy, there were two teams within Microsoft: the Commerce Server Team and the COM+ team. The Commerce Server Team was implementing technology it called Commerce Server Messaging Pipelines, which was essentially software that allowed applications to move messages from one system to another...

Windows Server Hacks
Windows Server Hacks
The tools, or hacks in this book reveal techniques that go well beyond basic management tasks found in most handbooks. Hacks range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, performance, security, and backup and recovery. No matter which Windows Server you use--NT,...
Pro SQL Server 2005 Replication (Definitive Guide)
Pro SQL Server 2005 Replication (Definitive Guide)
Replication is a way of copying and updating information in a database. This allows all users to see the same information and any changes made to it. Replication also duplicates the database across a number of computers so that, if one computer goes down, the information is not lost and can still be accessed. Pro SQL Server 2005...
Oracle Enterprise Manager 10g Grid Control Implementation Guide (Osborne ORACLE Press Series)
Oracle Enterprise Manager 10g Grid Control Implementation Guide (Osborne ORACLE Press Series)

Install and Configure Grid Control to Manage Your Oracle Landscape

Build a robust grid computing infrastructure with guidance from an Oracle expert who developed and taught the Grid Control Deep Dive class to Oracle Consulting. Featuring real-world examples and best practices, Oracle...

OCP Instructors Guide for Oracle DBA Certification: A Study Guide to Advanced Oracle Certified Professional Database Administration Techniques
OCP Instructors Guide for Oracle DBA Certification: A Study Guide to Advanced Oracle Certified Professional Database Administration Techniques

An instructor’s guide for teaching Oracle DBA certification candidates, this book is highly technical and written for Oracle Certified Professional (OCP) DBA instructors who want to ensure that their students successfully pass their Oracle OCP certification exam. Covering those OCP topics that students find the most challenging,...

Windows Server 2008 Hyper-V Unleashed
Windows Server 2008 Hyper-V Unleashed
Hyper-V is Microsoft’s server virtualization technology built-in to Windows Server 2008.  Virtual Machine Manager 2008 is a System Center add-on that helps organizations better manage their virtual guest images, delegate administration and management, and even extract virtual images from existing physical and virtual servers.  This...
OECD Information Technology Outlook 2010
OECD Information Technology Outlook 2010

The OECD Information Technology Outlook 2010 has been prepared by the OECD under the guidance of the OECD Committee for Information, Computer and Communications Policy (ICCP), and in particular the Working Party on the Information Economy. This edition is the tenth in a biennial series designed to provide members with a broad overview of...

Using SANs and NAS
Using SANs and NAS

Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quickly, thereby keeping their lifeblood flowing. W. Curtis Preston's...

Business Continuity and Disaster Recovery for InfoSec Managers
Business Continuity and Disaster Recovery for InfoSec Managers
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of
...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a...

unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy