Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)
Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)

A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.

Enterprise Mac...

Securing Linux: A Survival Guide for Linux Security
Securing Linux: A Survival Guide for Linux Security
Increase the security of your Linux system with this handy, definitive guide. It presents the latest and best practices for securing a Linux system on both workstations and many server setups.

As the Linux operating system has matured and grown in popularity, security risks have increased. SANS is pleased to announce publication of
...
Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

iSCSI: The Universal Storage Connection
iSCSI: The Universal Storage Connection
iSCSI: The Universal Storage Connection is an informative overview and in-depth guide to the emerging iSCSI standard, the technology that enables data storage, access, and management over networks, intranets, and the Internet. The iSCSI protocol reduces the total cost of ownership of shared storage solutions and enables an...
Developing B2B Social Communities: Keys to Growth, Innovation, and Customer Loyalty
Developing B2B Social Communities: Keys to Growth, Innovation, and Customer Loyalty

Developing B2B Social Communities: Keys to Growth, Innovation, and Customer Loyalty explains why business-to-business companies need a robust online community strategy to survive and flourish in today’s changing economy and shows you how to design and execute your company’s strategy successfully.

...
IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Using SANs and NAS
Using SANs and NAS

Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quickly, thereby keeping their lifeblood flowing. W. Curtis Preston's...

MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
Welcome to the MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214. This book provides in-depth and detailed information about the major security services in Microsoft Windows 2000 networks, including securing desktops and servers using Group Policy, configuring and managing...
Best of TOC 2012
Best of TOC 2012

The acceleration of change and innovation in the publishing industry today is dizzying, and the pace can be overwhelming. At O’Reilly’s TOC New York Conference in February 2012, practitioners and executives from the publishing and tech...

Intro to Java Programming, Comprehensive Version (10th Edition)
HTML5 for Publishers
HTML5 for Publishers

HTML5 is revolutionizing the Web, and now it's coming to your ebook reader! With the release of the EPUB 3 specification, HTML5 support is officially a part of the EPUB standard, and publishers are able to take full advantage of HTML5's rich...

Pregnant in the Time of Ebola: Women and Their Children in the 2013-2015 West African Epidemic (Global Maternal and Child Health)
Pregnant in the Time of Ebola: Women and Their Children in the 2013-2015 West African Epidemic (Global Maternal and Child Health)

This comprehensive account of the deadliest Ebola outbreak in history examines its devastating effects on West Africa’s most vulnerable populations: pregnant women and children. Noted experts across disciplines assess health care systems’ responses to the epidemic in Liberia, Guinea, and Sierra Leone, emphasizing key...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy