Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Convergence of Mobile and Stationary Next-Generation Networks
Convergence of Mobile and Stationary Next-Generation Networks

The optical networking technology that suffered in the post - dot - com crash several years ago has since recovered and is once again poised for rapid growth due to the exhaustion of available bandwidth. Today, photonics networks transport Internet data over large distances in long - haul and metropolitan networks. Improvements in...

.NET Security
.NET Security
  • In-depth coverage of the cryptographic classes in .NET
  • Comprehensive analysis of the .NET security model
  • Detailed coverage of securing ASP.NET applications
  • Useful information on how to secure XML-based data under .NET

When you use .NET to create client- and server-side...

Mastering VMware Infrastructure 3
Mastering VMware Infrastructure 3
Transform your IT infrastructure without extra hardware

Cut hardware costs, expand your capacity, and manage an entire fleet of virtual machines in your enterprise with the leading virtualization solution, VMware Infrastructure 3 (VI3), and the step-by-step instruction in this must-have guide. This essential book is packed...

OpenStack Cloud Computing Cookbook
OpenStack Cloud Computing Cookbook
OpenStack is an open source software for building public and private clouds, born from Rackspace and NASA. It is now a global success and is developed and supported by scores of people around the globe and backed by some of the leading players in the cloud space today. This book is specifically designed to quickly help you get up...
Incident Response: Computer Forensics Toolkit
Incident Response: Computer Forensics Toolkit
Your in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks

Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer...

Professional Excel Development : The Definitive Guide to Developing Applications Using Microsoft(R) Excel and VBA(R)
Professional Excel Development : The Definitive Guide to Developing Applications Using Microsoft(R) Excel and VBA(R)

Finally, there's a book that treats Excel as the powerful development platform it really is, and covers every facet of developing commercial-quality Excel applications.

This is not a book for beginners. Writing for professional developers and true Excel experts, the authors share insider's knowledge...

IM Instant Messaging Security
IM Instant Messaging Security
Securing Instant Messaging (IM) is one of the top three priorities for IT managers to consider in the next 12 months. If IM security problems have been keeping you up at night . . . they should! According to research firm IDC, corporate IM users will jump from nearly 50 million in 2003 to over 181 million by 2005.

If your company is like
...
VMware VI3 Implementation and Administration
VMware VI3 Implementation and Administration

This is the most comprehensive guide to planning for, implementing, securing, maintaining, monitoring, and troubleshooting VMware VI3 in any IT environment. Written by Eric Siebert, a veteran VMware system administrator and one of only 300 vExperts named by VMware in 2009, this book will help IT professionals make the best...

Hacker Linux Uncovered
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log...
Beginning SQL Server for Developers
Beginning SQL Server for Developers

Beginning SQL Server for Developers is the perfect book for developers new to SQL Server and planning to create and deploy applications against Microsoft’s market-leading database system for the Windows platform. Now in its fourth edition, the book is enhanced to cover the very latest developments in SQL Server, including the...

Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators
Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators

The definitive guide to administering a Red Hat Enterprise Linux 6 network

Linux professionals who need a go-to guide on version 6 of Red Hat Enterprise Linux (RHEL) will find what they need in this comprehensive Sybex book. It covers RHEL administration in detail, including how to set up and manage web and mail services,...

CYA: Securing Exchange Server 2003 & Outlook Web Access
CYA: Securing Exchange Server 2003 & Outlook Web Access
Coverage includes: Exchange 2000 Administrative Rights, Mailbox Rights, Denial of Service and Exchange, Types of File Vulnerabilities, Vulnerability of Transmitted Data, Message Authenticity, Event Service and Event Sinks, Message Relay via SMTP, Preventing Exchange Security Problems, The W2K/IIS Platform Must Be Solid, Dedicate Servers to Specific...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy