Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
No Plastic Sleeves: The Complete Portfolio Guide for Photographers and Designers
No Plastic Sleeves: The Complete Portfolio Guide for Photographers and Designers

Your resume and cover letter, as well as a digital portfolio, business card and mailers, will function as the first contact and impression you make. These items will work to get your "foot in the door." Ultimately, however, it will be your portfolio book or online portfolio website that will land you the job. The creation of your...

Inventors at Work: The Minds and Motivation Behind Modern Inventions
Inventors at Work: The Minds and Motivation Behind Modern Inventions

Inventors at Work: The Minds and Motivation Behind Modern Inventions is a collection of interviews with inventors of famous products, innovations, and technologies that have made life easier or even changed the way we live. All of these scientists, engineers, wild-eyed geniuses, and amateur technologists have dedicated their...

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Apache The Definitive Guide, 3rd Edition
Apache The Definitive Guide, 3rd Edition
Updated to cover the changes in Apache's latest release, 2.0, as well as Apache 1.3, this useful guide discusses how to obtain, set up, secure, modify, and troubleshoot the Apache software on both Unix and Windows systems. In addition to covering the installation and configuration of mod_perl and Tomcat, the book examines PHP,...
Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100), Fourth Edition
CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100), Fourth Edition

This book focuses on the objectives for the CWNA exam, but it's also a useful learning tool for anyone wanting to master the many domains of wireless. You’ll learn about wireless technology basics such as radio frequency—based communications, and you’ll learn about specific standards and protocols that ...

Test Driving Linux: From Windows to Linux in 60 Seconds
Test Driving Linux: From Windows to Linux in 60 Seconds
For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you...
Microsoft Tabular Modeling Cookbook
Microsoft Tabular Modeling Cookbook

No prior knowledgeof tabular modeling is needed to benefit from this brilliant cookbook. This is the total guide to developing and managing analytical models using the Business Intelligence Semantic Models technology.

Overview

  • Develop tabular models for personal use
  • Learn about the modeling...
NTP Security: A Quick-Start Guide
NTP Security: A Quick-Start Guide

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline.

NTP Security: A Quick-Start...

Banned from Ebay: How to Create a New Account and Get Back on PayPal and eBay after Being Limited or Suspended
Banned from Ebay: How to Create a New Account and Get Back on PayPal and eBay after Being Limited or Suspended
After reading Banned from eBay you will learn to anonymously sell on eBay without the risk of getting suspended again. If have been limited by PayPal then you will also be able to get back on PayPal after you have applied the information provided throughout this book. Given that you apply all the tactics and follow the outlined step by step...
Secure Messaging with Microsoft  Exchange Server 2003
Secure Messaging with Microsoft Exchange Server 2003

Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...

Red Hat Linux Security and Optimization
Red Hat Linux Security and Optimization
Your Official Red Hat® Linux® Guide to Security and Optimization Reviewed and approved by the experts at Red Hat, this comprehensive guide delivers the know-how you need to improve the performance of your Red Hat Linux system—and protect it from attacks and break-ins. Red Hat Linux expert Mohammed Kabir starts by...
unlimited object storage image
Result Page: 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy