Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

Security of Mobile Communications
Security of Mobile Communications

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.

Providing technicians and designers with a...

Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference
Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference

Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions; and discusses its deployment.
After introducing Windows Server 2008
...

Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
Running Xen: A Hands-On Guide to the Art of Virtualization
Running Xen: A Hands-On Guide to the Art of Virtualization
“This accessible and immediately useful book expertly provides the Xen community with everything it needs to know to download, build, deploy and manage Xen implementations.”

—Ian Pratt, Xen Project Leader VP Advanced Technology, Citrix Systems

Citrix® XenMobile™ Mobile Device Management
Citrix® XenMobile™ Mobile Device Management

Get up to speed with mobile device management with this fantastic, fully illustrated guide to XenMobile. From security to package deployment, it's an essential companion for the current trend of BYOD and corporate mobile devices.

Overview

  • Deploy and manage the complete XenMobile solution
  • ...
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Overview

  • Learn sample forms and process flows for quick and easy use.
  • An easy-to-follow reference for implementing information security in the enterprise.
  • Learn...
MCAD/MCSD: Visual Basic .NET Windows and Web Applications Study Guide
MCAD/MCSD: Visual Basic .NET Windows and Web Applications Study Guide

Here’s the book you need to prepare for the Developing Web Applications (70-305) and Developing Windows-based Applications (70-306) MCAD and MCSD exams. This Study Guide provides:

  • In-depth coverage of official exam objectives
  • Practical information on using Visual Basic .NET to develop Windows and Web...
EJB Cookbook
EJB Cookbook
All but two recipes in this book are based on the EJB 2.0 specification. The recipes on creating EJB web service endpoints and the EJB timer service are based on the EJB 2.1 specification. In a few chapters, the book covers other technologies or frameworks where appropriate. In fact, this book makes use of XDoclet, log4j, Ant, and Cactus. For...
VCP5-DCV VMware Certified Professional-Data Center Virtualization on vSphere 5.5 Study Guide: Exam VCP-550
VCP5-DCV VMware Certified Professional-Data Center Virtualization on vSphere 5.5 Study Guide: Exam VCP-550

Prepare for the VCP-DCV Exam

Prepare yourself for VMware's challenging VMware Certified Professional-Data Center Virtualization exam, as well as the typical tasks and responsibilities you can expect as a VMware vSphere 5.5-certified professional. This comprehensive book guides you through all topics and objectives...

How to Cheat at Securing SQL Server 2005
How to Cheat at Securing SQL Server 2005
The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005.

SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to
...
Native Docker Clustering with Swarm
Native Docker Clustering with Swarm

Key Features

  • Get to grips with Docker Swarm, one of the key components of the Docker ecosystem.
  • Optimize Swarm and SwarmKit features for scaling massive applications through containers.
  • Learn about Docker’s scheduling tricks, high availability, security, and platform scalability.
  • ...
unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy