 |
|
 Microsoft Dynamics CRM 4.0 UnleashedMicrosoft® Dynamics CRM 4.0 Unleashed presents start-to-finish guidance for planning, customizing, deploying, integrating, and managing Dynamics CRM in your unique business and technical environment. Authored by two leading Microsoft Dynamics implementers, this book systematically explains how the system... |  |  How to Do Everything with Adobe Acrobat 7.0Create and distribute PDF (Portable Document Format) files using Adobe Acrobat 7.0. This easy-to-follow guide shows you how to generate Adobe PDF files that retain the look and feel of the original documents, share PDFs, initiate and participate in PDF document reviews, and prepare PDFs for print or the Web. You’ll also learn to develop... |  |  IT Compliance and Controls: Best Practices for ImplementationPraise for IT Compliance and Controls
"James DeLuccia outlines a comprehensive, integrated strategy for achieving regulatory and legislative compliance. This approach is vastly superior, both in scalability and in sustainability, to the siloed compliance strategies that are often seen." —Dr. Richard Reiner, founder,... |
|
 Nmap in the Enterprise: Your Guide to Network ScanningRichard Stiennon, vice president at Gartner "Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."
A... |  |  Mastering Active Directory for Windows Server 2008Detailed Coverage of Active Directory for Windows Server 2008, 2003, 2003 R2, and 2000
If you are responsible for the day-to-day operations of Active Directory, you need this book. From Windows Server 2000 up through the new features available in Windows Server 2008, this comprehensive guide gives you the practical... |  |  Data Hiding Fundamentals and Applications: Content Security in Digital MultimediaMultimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with... |
|
 Real-Time Concepts for Embedded Systems'... a very good balance between the theory and practice of real-time embedded system designs.' —Jun-ichiro itojun Hagino, Ph.D., Research Laboratory, Internet Initiative Japan Inc., IETF IPv6 Operations Working Group (v6ops) co-chair 'A cl
Develop a working understanding of the common design patterns and program... |  |  |  |  Nokia Firewall, VPN, and IPSO Configuration GuideThe Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.
"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its... |
|
 SAS 9.1.3 Language Reference: Dictionary, 3-Volume SetNew and enhanced features in Base SAS save you time, effort, and system resources by providing faster processing and easier data access and management, more robust analysis, and improved data presentation.
- By using new SAS system options that enable threading and the use of multiple CPUs, the following SAS procedures take
... |  |  |  |  GFI Network Security and PCI Compliance Power ToolsUse GFI's Tools to Search for Vulnerabilities in Your Network!
For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.... |
|
Result Page: 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 |