Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Your Computers & Devices Step by Step
Network Your Computers & Devices Step by Step

In a modern home, it is no longer unusual for family members to own multiple computers and network devices. In most houses, you can find at least a desktop computer, which is generally used for more performance-intensive tasks such as gaming or professional work of any kind. Parents bring home their work laptops or notebooks, which they...

Designing Solutions for Microsoft SharePoint 2010: Making the right architecture and implementation decisions
Designing Solutions for Microsoft SharePoint 2010: Making the right architecture and implementation decisions

Microsoft® SharePoint® 2010 is the fourth incarnation of the popular collaboration and content management platform from Microsoft. With each release, the reach and capabilities of SharePoint products and technologies have grown, offering new tools to organizations and new opportunities to developers. With SharePoint 2010, you...

CompTIA A+ 220-701 and 220-702 Exam Cram (5th Edition)
CompTIA A+ 220-701 and 220-702 Exam Cram (5th Edition)

Welcome to the CompTIA A+ Exam Cram, Fifth Edition. This book prepares you for the CompTIA A+ Essentials Exam (number 220-701), and the CompTIA A+ Practical Application Exam (number 220-702) Imagine if you will, that you are at a testing center and have just been handed the passing scores for these exams. The goal of this...

Deploying Microsoft Forefront Threat Management Gateway 2010
Deploying Microsoft Forefront Threat Management Gateway 2010

When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,...

Pro Data Backup and Recovery
Pro Data Backup and Recovery

Pro Data Backup and Recovery has come from the many views of people that I have interacted with during my career as a systems administrator, systems engineer, and consultant. This book is primarily geared toward the systems engineers and architects within an organization, but it will also be useful for the day-to-day functions of systems...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Computer Forensics: A Pocket Guide
Computer Forensics: A Pocket Guide

Computer forensics has become an essential tool in the identification of misuse and abuse of systems. Whilst widely utilised within law enforcement, the rate of adoption by organisations has been somewhat slower, with many organisations focusing upon the traditional security countermeasures to prevent an attack from occurring in the first...

VCP4 Exam Cram: VMware Certified Professional (2nd Edition)
VCP4 Exam Cram: VMware Certified Professional (2nd Edition)

Virtualization is one of the hottest topics in the tech industry today. The leader in the virtualization space at the present time is without a doubt VMware with its virtual infrastructure offering. As VMware software began to take its place in the data center and demand respect in the industry, the need for a...

Facebook Me! A Guide to Socializing, Sharing, and Promoting on Facebook (2nd Edition)
Facebook Me! A Guide to Socializing, Sharing, and Promoting on Facebook (2nd Edition)

With more than 500 million active users around the world and still growing steadily, Facebook is more than just another social media site. In the words of author Dave Awl, Facebook is “the new town square”—the place where people gather to discuss the news of the day as well as share what’s going on in their lives. And...

Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara
Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized...

Result Page: 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy