 |
|
 CCNA Security 640-554 Official Cert Guide
Congratulations! If you are reading this, you have in your possession a powerful tool that can help you to
Improve your awareness and knowledge of network security
Increase your skill level related to the implementation of that security
Prepare for the CCNA Security... |  |  Pro SQL Server 2012 Reporting Services (Professional Apress)
At its core, the process of designing reports hasn’t changed substantially in the past 20 years. The report designer lays out report objects, which contain data from a known source of data, in a design application such as Reporting Services, Business Objects Reports, or Microsoft Access. He or she then tests report execution,... |  |  OpenStack Cloud Computing Cookbook
OpenStack is an open source software for building public and private clouds, born from
Rackspace and NASA. It is now a global success and is developed and supported by scores
of people around the globe and backed by some of the leading players in the cloud space
today. This book is specifically designed to quickly help you get up... |
|
|
 Citrix XenDesktop 5.6 Cookbook
The way people work is changing; users need to access their resources anywhere, on any device. Citrix XenDesktop gives you this flexibility. In this Cookbook, you will learn how Citrix XenDesktop 5.6 and related products are powerful and flexible enough for you to publish your resources - Desktops, Applications and contents - wherever and on... |  |  Resumes For Dummies
Write a winning resume and land that job interview!
Is your job search stalling out after you submit a resume but before you're offered an interview? With a recession that has caused a 10% unemployment rate affecting 15.3 million Americans, having a winning resume is vital to securing an interview-and it demands a fresh look at... |  |  Spring Security 3.1
Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to... |
|
|
| Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |