Home | Amazing | Today | Tags | Publishers | Years | Search 
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and...
The First 90 Days: Critical Success Strategies for New Leaders at All Levels
The First 90 Days: Critical Success Strategies for New Leaders at All Levels
Whether challenged with taking on a startup, turning a business around, or inheriting a high-performing unit, a new leader's success or failure is determined within the first 90 days on the job.

In this hands-on guide, Michael Watkins, a noted expert on leadership transitions, offers proven strategies for moving successfully into a...

Home Networking For Dummies (Computer/Tech)
Home Networking For Dummies (Computer/Tech)

Integrate a Vista PC into your existing XP network

Share the Internet and work more efficiently from anywhere in your home!

Ready to become the administrator of your own home network? This bestselling guide has been fully updated to walk you through all the newest options...

Defending the Digital Frontier: A Security Agenda
Defending the Digital Frontier: A Security Agenda

Praise for Defending the Digital Frontier

"The charge of securing corporate America falls upon its business leaders. This book, offered by Ernst & Young and written by Mark Doll, Sajay Rai, and Jose Granado, is not only timely, but comprehensive in outlook and broad in scope. It addresses many of the critical security...

Microsoft Windows Vista Management and Administration
Microsoft Windows Vista Management and Administration

This book will show administrators how to manage and administer the advanced functions and security features in Windows Vista. The recommendations, tips, tricks, and best practices are based on years of early-adopter implementations of Windows Vista in large corporate and private environments. The authors highlight the functions...

Linux Bible, 2008 Edition: Boot up to Ubuntu, Fedora, KNOPPIX, Debian, openSUSE, and 11 Other Distributions
Linux Bible, 2008 Edition: Boot up to Ubuntu, Fedora, KNOPPIX, Debian, openSUSE, and 11 Other Distributions
Great Content from a Bestselling Author: The Linux Bible 2008 Edition is the best first Linux book for new or migrating users. By focusing on the building-block nature of Linux, and offering true up-to-date descriptions of Linux technology, the Bible helps the reader learn how to jump headlong into Linux, regardless of the...
Microsoft® Exchange Server 2007 Administrator's Companion
Microsoft® Exchange Server 2007 Administrator's Companion
Get your mission-critical messaging and collaboration systemsup and running with the essential guide to deploying and managing ExchangeServer 2007. This comprehensive administrator's reference covers the fullrange of server and client deployments, unified communications, messagingsecurity, performance optimization, troubleshooting, and disaster...
Java EE 5 Development using GlassFish Application Server
Java EE 5 Development using GlassFish Application Server
This is a guide to developing Java EE 5 applications deployed to the high-performance, Java EE 5-compliant GlassFish application server, which is quickly gaining massive popularity. After GlassFish installation and configuration, it covers application development, including all major Java EE 5 APIs: JSPs, JSTL, Servlets, and JSF for web...
National Security (Information Plus Reference Series)
National Security (Information Plus Reference Series)
National Security is part of the Information Plus Reference Series. The purpose of each volume of the series is to present the latest facts on a topic of pressing concern in modern American life. These topics include today’s most controversial and most studied social issues: abortion, capital punishment, care for the elderly, crime, the...
Beginning Web Development, Silverlight, and ASP.NET AJAX: From Novice to Professional
Beginning Web Development, Silverlight, and ASP.NET AJAX: From Novice to Professional
This book is aimed at equipping you, the developer, to understand the technologies that are available to allow you to rapidly build secure, quality web experiences. Note that I use the term experiences and not applications or sites. That is because the user experience is the heart of the future Web.

Before you can start looking at the
...
WiMAX Handbook (McGraw-Hill Communications)
WiMAX Handbook (McGraw-Hill Communications)
Get a thorough introduction to WiMAX--the revolutionary new 802.16 IEEE standard for point-to-point and point-to-multipoint wireless broadband access. Written by networking expert Frank Ohrtman, this detailed guide annotates the 802.16 specification and explains how to design and build a robust, reliable, and secure WiMAX network that takes full...
Security+ Certification Training Kit
Security+ Certification Training Kit

Welcome to the Security+ Certification Training Kit. This training kit introduces the basic concepts of computer security. It is designed to prepare you to take the Security+ Certification exam administered by the Computing Technology Industry Association (CompTIA). The Security+...

Result Page: 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy