Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Dynamics CRM 4.0 Unleashed
Microsoft Dynamics CRM 4.0 Unleashed
Microsoft® Dynamics CRM 4.0 Unleashed presents start-to-finish guidance for planning, customizing, deploying, integrating, and managing Dynamics CRM in your unique business and technical environment. Authored by two leading Microsoft Dynamics implementers, this book systematically explains how the system...
How to Do Everything with Adobe Acrobat 7.0
How to Do Everything with Adobe Acrobat 7.0
Create and distribute PDF (Portable Document Format) files using Adobe Acrobat 7.0. This easy-to-follow guide shows you how to generate Adobe PDF files that retain the look and feel of the original documents, share PDFs, initiate and participate in PDF document reviews, and prepare PDFs for print or the Web. You’ll also learn to develop...
IT Compliance and Controls: Best Practices for Implementation
IT Compliance and Controls: Best Practices for Implementation
Praise for IT Compliance and Controls

"James DeLuccia outlines a comprehensive, integrated strategy for achieving regulatory and legislative compliance. This approach is vastly superior, both in scalability and in sustainability, to the siloed compliance strategies that are often seen."
—Dr. Richard Reiner, founder,
...

Nmap in the Enterprise: Your Guide to Network Scanning
Nmap in the Enterprise: Your Guide to Network Scanning
Richard Stiennon, vice president at Gartner
"Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."

A
...
Mastering Active Directory for Windows Server 2008
Mastering Active Directory for Windows Server 2008
Detailed Coverage of Active Directory for Windows Server 2008, 2003, 2003 R2, and 2000

If you are responsible for the day-to-day operations of Active Directory, you need this book. From Windows Server 2000 up through the new features available in Windows Server 2008, this comprehensive guide gives you the practical...

Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with...
Real-Time Concepts for Embedded Systems
Real-Time Concepts for Embedded Systems
'... a very good balance between the theory and practice of real-time embedded system designs.' —Jun-ichiro itojun Hagino, Ph.D., Research Laboratory, Internet Initiative Japan Inc., IETF IPv6 Operations Working Group (v6ops) co-chair 'A cl

Develop a working understanding of the common design patterns and program
...
JD Edwards EnterpriseOne: The Complete Reference (Osborne ORACLE Press Series)
JD Edwards EnterpriseOne: The Complete Reference (Osborne ORACLE Press Series)
Your definitive guide to JD Edwards EnterpriseOne

Implement and maintain a fully integrated, SOA-based ERP framework across your entire corporation. JD Edwards EnterpriseOne: The Complete Reference explains how to install and administer JD Edwards EnterpriseOne, store BI information in data marts and warehouses, manage...

Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
SAS 9.1.3 Language Reference: Dictionary, 3-Volume Set
SAS 9.1.3 Language Reference: Dictionary, 3-Volume Set
New and enhanced features in Base SAS save you time, effort, and system resources by providing faster processing and easier data access and management, more robust analysis, and improved data presentation.
  •  By using new SAS system options that enable threading and the use of multiple CPUs, the following SAS procedures take...
Oracle Enterprise Manager 10g Grid Control Implementation Guide (Osborne ORACLE Press Series)
Oracle Enterprise Manager 10g Grid Control Implementation Guide (Osborne ORACLE Press Series)

Install and Configure Grid Control to Manage Your Oracle Landscape

Build a robust grid computing infrastructure with guidance from an Oracle expert who developed and taught the Grid Control Deep Dive class to Oracle Consulting. Featuring real-world examples and best practices, Oracle...

GFI Network Security and PCI Compliance Power Tools
GFI Network Security and PCI Compliance Power Tools
Use GFI's Tools to Search for Vulnerabilities in Your Network!

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.
...
Result Page: 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy