Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Defend I.T. : Security by Example
Defend I.T. : Security by Example

The battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to...

Building a Virtual Private Network
Building a Virtual Private Network

Your business must be connected in order to compete in the global marketplace. Employees need to know that their company's network is accessible at any time, from any place. A Virtual Private Network (VPN) accomplishes this by utilizing remote connectivity technologies that combine existing internal networks with the Internet to securely...

Practical DWR 2 Projects (Expert's Voice in Java)
Practical DWR 2 Projects (Expert's Voice in Java)

The Ajax craze is sweeping the world, and there is no shortage of libraries from which to choose to make it all easier to develop. One of those libraries has risen near the top in the Java space, and that library is DWR. DWR, or Direct Web Remoting, allows you to treat your Java classes running on the server as if they were local objects running...

Cisco IOS Access Lists
Cisco IOS Access Lists
Cisco IOS Access Lists takes a methodical approach to access lists and their capabilities, and is ideal for administrators of Cisco equipment who have configured access lists before but feel as if they're not taking full advantage of their capabilities (which, author Jeff Sedayao proves, extend well beyond security). Much of what Sedayao...
Mainframe Basics for Security Professionals: Getting Started with RACF
Mainframe Basics for Security Professionals: Getting Started with RACF
Security—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers...
Check Point NG VPN-1/Firewall-1: Advanced Configuration and Troubleshooting
Check Point NG VPN-1/Firewall-1: Advanced Configuration and Troubleshooting
Security of corporate networks has become big business. Many companies are willing
to provide hardware, software, consulting, design, and implementation services.The
product space is vast, offering many different levels of products that claim to provide
all manner of solutions.The problem with the current state of the security space
...
Professional Silverlight 4 (Wrox Programmer to Programmer)
Professional Silverlight 4 (Wrox Programmer to Programmer)

Everything .NET developers need to take advantage of Silverlight 4

Silverlight 4 is a major new release of Microsoft's flagship product for building rich, interactive applications that combine animation, graphics, audio, and video. This book, by seasoned Wrox authors and Silverlight experts, gives professional Web...

Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks
Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks

The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task.
...

Beginning Expression Web (Wrox Beginning Guides)
Beginning Expression Web (Wrox Beginning Guides)
Microsoft Expression Web gives you the tools to develop sophisticated sites that integrate standardized CSS layout with ASP.NET 2.0, XML, and SQL Server™ 2005. Written by an experienced ASP.NET and Dreamweaver Web developer, this book shows you how to take advantage of all of Expression Web’s innovative features to create a memorable...
Getting Started with Kubernetes - Second Edition
Getting Started with Kubernetes - Second Edition

Learn how to schedule and run application containers using Kubernetes.

About This Book

  • Get well-versed with the fundamentals of Kubernetes and get it production-ready for deployments
  • Confidently manage your container clusters and networks using Kubernetes
  • This practical...
Security+Fast Pass
Security+Fast Pass

The Perfect Preparation and Review Resource

Security+ Fast Pass is the streamlined tool you need to bone up for the Security+ exam [SYO-101]. The enclosed CD lets you practice, practice, practice, and you’ll keep the book—packed with concise, objective-focused coverage and
...

Networking For Dummies
Networking For Dummies

The bestselling beginning networking book is now updated to cover the latest tools and trends!

Fully updated and revised to include the latest trends in networking, this perennial bestseller features updated coverage of broadband technologies, storage, and backup. You'll discover the hottest topics for setting up a network at...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy