Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Messaging with Microsoft  Exchange Server 2003
Secure Messaging with Microsoft Exchange Server 2003

Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...

Red Hat Linux Security and Optimization
Red Hat Linux Security and Optimization
Your Official Red Hat® Linux® Guide to Security and Optimization Reviewed and approved by the experts at Red Hat, this comprehensive guide delivers the know-how you need to improve the performance of your Red Hat Linux system—and protect it from attacks and break-ins. Red Hat Linux expert Mohammed Kabir starts by...
The Small-Cap Investor: Secrets to Winning Big with Small-Cap Stocks
The Small-Cap Investor: Secrets to Winning Big with Small-Cap Stocks

Praise for The Small-Cap Investor

"The great rewards of investing in the best small-cap companies are matched only by the risks of investing in the worst. Ian Wyatt is one of the few who not only shows you how to find the hidden gems, but also how to avoid the flea-ridden dogs. His new book is a must-read for all...

Nanoparticles and Occupational Health (Journal of Nanoparticle Research, 9)
Nanoparticles and Occupational Health (Journal of Nanoparticle Research, 9)

This volume, a reprint from a special issue of the Journal of Nanoparticle Research, draws on work presented at The Second International Symposium on Nanotechnology and Occupational Health, held in Minnesota in 2005. It presents an interdisciplinary approach to nanotechnology and occupational health and offers an overview of recent...

Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The effective management of risks online is likely to be the greatest business enabler / destroyer of the next decade. Clearly, organizations that do not move to full e-commerce functionality are unlikely to flourish; whereas those that ignore cyber crime and the "dark side" of the Internet are likely to get badly burnt.

This...

Integrated Auditing of ERP Systems
Integrated Auditing of ERP Systems

This book is designed not to provide detailed audit/review programs for ERP systems but to underline the main concepts involved in each major phase of the ERP life cycle, as well as the major components of ERP systems of special interest to auditors. It is intended to familiarize the reader with the built-in controls in the ERP architecture...

The Start-up of You: Adapt to the Future, Invest in Yourself, and Transform Your Career
The Start-up of You: Adapt to the Future, Invest in Yourself, and Transform Your Career

A blueprint for thriving in your job and building a career by applying the lessons of Silicon Valley's most innovative entrepreneurs.

The career escalator is jammed at every level. Unemployment rates are sky-high. Creative disruption is shaking every industry. Global competition for jobs is fierce. The
...

Using the Internet Safely For Seniors For Dummies (Computer/Tech)
Using the Internet Safely For Seniors For Dummies (Computer/Tech)
The Internet is amazing, but the risks you’ve heard about are real, too. You can avoid being a victim of online crime with the simple steps for staying safe online that you’ll find in Using the Internet Safely For Seniors For Dummies.

Here’s the guide you need to steer safely through the hazards so you can shop,...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

A Manager's Guide to Employment Law: How to Protect Your Company and Yourself
A Manager's Guide to Employment Law: How to Protect Your Company and Yourself
A Manager's Guide to Employment Law:
  • Explains the fundamental concept of employmentlaw— employment-at-will — and how it has changed over recent years
  • Coaches managers on the specifics of evaluating the opportunities and risks associated with workforce decisions
  • Covers...
Project Management Absolute Beginner's Guide (3rd Edition)
Project Management Absolute Beginner's Guide (3rd Edition)

Succeed as a project manager, even if you’ve never run a project before! This book is the fastest way to master every project management task, from upfront budgeting and scheduling through execution, managing teams through closing projects, and learning from experience. Updated for the latest web-based project...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy