|
|
|
|
|
Microsoft Exchange Server 2013 PowerShell Cookbook: Second Edition
Benefit from over 120 recipes that tackle the everyday issues that arise with Microsoft Exchange Server. Using PowerShell you'll learn to add scripts that provide new functions and efficiencies. Only basic knowledge required.
Overview
-
Newly updated and improved for Exchange Server 2013 and PowerShell...
| | Windows Forensics and Incident RecoveryIf you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize ... | | Oracle Database 12c Backup and Recovery Survival Guide
A comprehensive guide for every DBA to learn recovery and backup solutions
Overview
-
A practical reference to all Oracle backup and recovery options available, making it essential to any DBA in the world
-
A valuable guide for readers on the most frequent backup and recovery scenarios they can...
|
|
Modern Analysis of Customer Surveys: with Applications using R
Customer survey studies deals with customers, consumers and user satisfaction from a product or service. In practice, many of the customer surveys conducted by business and industry are analyzed in a very simple way, without using models or statistical methods. Typical reports include descriptive statistics and basic graphical displays. As ... | | Qshell for iSeriesWritten for users who are more comfortable with DDS, CL, and RPG as well as those using modern languages such as C and Java, this book allows those who are unfamiliar with Unix to easily learn the Qshell technology.
Sometimes you hit a home run with a computer software book. This one is it. You don’t have much choice when it comes... | | Guide to Computer Network Security (Computer Communications and Networks)Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to... |
|
|
|
Result Page: 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 |