Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security: A Beginner's Guide
Network Security: A Beginner's Guide

Learn network security basics using this practical guide

Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the best and most up-to-date security practices--from one resource. You'll learn how to...

Professional SQL Server 2000 Data Warehousing with Analysis Services
Professional SQL Server 2000 Data Warehousing with Analysis Services
Data warehouses have evolved to cope with the huge volumes of data flowing through the workplace by separating the data used for reporting and decision making from the operational systems. The purpose of the data warehouse is simply to store the raw data, and in combination with Microsoft SQL Server 2000 Analysis Services, this data can be...
Hands-on Kubernetes on Azure: Use Azure Kubernetes Service to automate management, scaling, and deployment of containerized applications, 3rd Edition
Hands-on Kubernetes on Azure: Use Azure Kubernetes Service to automate management, scaling, and deployment of containerized applications, 3rd Edition

Understand the fundamentals of Kubernetes deployment on Azure with a learn-by-doing approach

Key Features

  • Get to grips with the fundamentals of containers and Kubernetes
  • Deploy containerized applications using the Kubernetes platform
  • Learn how you can...
Web And Information Security
Web And Information Security
Recent developments in information systems technologies have resulted in computerizing many applications in various business areas. Data have become a critical resource in many organizations; therefore, efficient access to data, sharing data, extracting information from data, and making use of information has become an urgent need. As a result,...
Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) Presents best practices for locking down network...
Pro Spring Security
Pro Spring Security

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security will be a reference and advanced tutorial
...

Mac OS X Leopard QuickSteps
Mac OS X Leopard QuickSteps
Step-by-Step, Full-Color Graphics!

Get started using Mac OS X 10.5 Leopard right away--the QuickSteps way. Color screenshots and clear instructions show you how to use all the new and improved features available in...

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

One of the most mysterious areas of information security is industrial system security.
No other area of information security contains that many myths, mistakes, misconceptions
and outright lies. Information available online, while voluminous, will
only lead information security professionals and industrial systems
...

Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
A single hype is not enough to change the world. But multiple hypes together can change it as long as they are part of a bigger trend.

This book discusses more than one hyped technology: cloud computing, NoSQL, and HTML5. The technologies in this book combine well with other hyped technologies: functional
...
Practical SharePoint 2013 Enterprise Content Management
Practical SharePoint 2013 Enterprise Content Management

Practical SharePoint 2013 Enterprise Content Management is the first book to guide you through planning and designing each phase of your information life cycle with SharePoint 2013. Author and SharePoint expert Steve Goodyear walks you through how to analyze and plan enterprise content management (ECM) solutions for an effective and...

MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
Welcome to the MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214. This book provides in-depth and detailed information about the major security services in Microsoft Windows 2000 networks, including securing desktops and servers using Group Policy, configuring and managing...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

unlimited object storage image
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy