Home | Amazing | Today | Tags | Publishers | Years | Search 
Storage Network Performance Analysis
Storage Network Performance Analysis
Your in-depth guide to analyzing and fine-tuning storage area network performance

Here, for the first time, is your complete resource for optimizing SAN performance and reliability in your organization. Whether you need to evaluate an existing system or design one from the ground up, this book provides a comprehensive, vendor-neutral collection...

iSCSI: The Universal Storage Connection
iSCSI: The Universal Storage Connection
iSCSI: The Universal Storage Connection is an informative overview and in-depth guide to the emerging iSCSI standard, the technology that enables data storage, access, and management over networks, intranets, and the Internet. The iSCSI protocol reduces the total cost of ownership of shared storage solutions and enables an...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

grep Pocket Reference
grep Pocket Reference
grep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Gigabit Ethernet for Metro Area Networks
Gigabit Ethernet for Metro Area Networks
Gigabit Ethernet has been deployed in the metro space, providing low cost, easily managed bandwidth for intensive applications like video, storage, and ASPs. 10 Gigabit Ethernet (IEEE 802.3a) will make the use of Ethernet in the Metro area even more attractive. IDC projects that GigE revenues in the U.S., marked at $155 million in 2001, will grow...
Windows Forensic Analysis DVD Toolkit, Second Edition
Windows Forensic Analysis DVD Toolkit, Second Edition

"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."
-Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer

"The Registry Analysis chapter alone is worth the price of the book."
-Troy Larson, Senior
...

The Myths of Innovation
Microsoft Exchange Server 2010 Best Practices
CISSP Study Guide, Second Edition
CISSP Study Guide, Second Edition

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam's Common Body of Knowledge. The ten domains are covered completely and as...

Developing B2B Social Communities: Keys to Growth, Innovation, and Customer Loyalty
Developing B2B Social Communities: Keys to Growth, Innovation, and Customer Loyalty

Developing B2B Social Communities: Keys to Growth, Innovation, and Customer Loyalty explains why business-to-business companies need a robust online community strategy to survive and flourish in today’s changing economy and shows you how to design and execute your company’s strategy successfully.

...
4G: Deployment Strategies and Operational Implications
4G: Deployment Strategies and Operational Implications

Specific operational requirements drive early network architectural and design decisions for 4G networks. 4G: Deployment Strategies and Operational Implications evaluates the specific design and deployment options and strategies for LTE network business development. LTE is a...

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy