Home | Amazing | Today | Tags | Publishers | Years | Search 
Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Pro Data Backup and Recovery
Pro Data Backup and Recovery

Pro Data Backup and Recovery has come from the many views of people that I have interacted with during my career as a systems administrator, systems engineer, and consultant. This book is primarily geared toward the systems engineers and architects within an organization, but it will also be useful for the day-to-day functions of systems...

Deploying Microsoft Forefront Threat Management Gateway 2010
Deploying Microsoft Forefront Threat Management Gateway 2010

When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,...

CompTIA A+ 220-701 and 220-702 Exam Cram (5th Edition)
CompTIA A+ 220-701 and 220-702 Exam Cram (5th Edition)

Welcome to the CompTIA A+ Exam Cram, Fifth Edition. This book prepares you for the CompTIA A+ Essentials Exam (number 220-701), and the CompTIA A+ Practical Application Exam (number 220-702) Imagine if you will, that you are at a testing center and have just been handed the passing scores for these exams. The goal of this...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

802.11 Security
802.11 Security

802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent...

Building Websites with ExpressionEngine 2
Building Websites with ExpressionEngine 2

ExpressionEngine is a flexible, feature-rich content management system used by top designers and web professionals across the world to build and manage their websites. It is written in the world's most popular web scripting language, PHP, and built on the MySQL database server. Are you eager to start creating websites with...

Fixed Mobile Convergence Handbook
Fixed Mobile Convergence Handbook

Requirements for next generation networks (NGNs) are fueling an architectural evolution. Service providers are obliged to give users access to content anytime, anyhow, anywhere, on any device. This requires a converged infrastructure in which users across multiple domains can be served through a single unified domain and all network services...

Developing Real World Software
Developing Real World Software

Ideal for use in a software engineering lab or special topics setting, Developing Real World Software is a practical guide for developing useful, real world software applications that are high performing, secure, reliable, and configurable. It expands upon material presented in traditional software engineering texts and focuses on key...

Essential SharePoint 2010: Overview, Governance, and Planning
Essential SharePoint 2010: Overview, Governance, and Planning

The Only Book That’s Completely Focused on Maximizing the Business Value of SharePoint 2010 Solutions

 

Essential SharePoint® 2010 approaches Microsoft SharePoint Server 2010 from a strict business value perspective,...

Technology Matters: Questions to Live With
Technology Matters: Questions to Live With

Winner, 2009 Sally Hacker Prize given by the Society for the History of Technology (SHOT). and Choice Outstanding Academic Title, 2006

Technology matters, writes David Nye, because it is inseparable from being human. We have used tools for more than 100,000 years, and their central purpose has not always been to
...

MySQL for Python
MySQL for Python

Python is a dynamic programming language, which is completely enterprise ready, owing largely to the variety of support modules that are available to extend its capabilities. In order to build productive and feature-rich Python applications, we need to use MySQL for Python, a module that provides database support to our applications. Although...

Result Page: 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy