Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IP Network Design Guide
IP Network Design Guide

This redbook identifies some of the basic design aspects of IP networks and explains how to deal with them when implementing new IP networks or redesigning existing IP networks. This project focuses on internetwork and transport layer issues such as address and name management, routing, network management, security, load...

Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fast
Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fast

Zimbra is open-source server and client software for messaging and collaboration: email, group calendaring, contacts, and web document management and authoring. The Zimbra server is available for Linux, Mac OS X, appliances, and virtualization platforms. The Zimbra Web 2.0 Ajax client runs on Firefox, Safari, and IE, and features easy...

CompTIA Network+ Deluxe Study Guide: (Exam N10-004)
CompTIA Network+ Deluxe Study Guide: (Exam N10-004)

More than 220,000 network professionals have achieved the Network+ certification since its inception, second only to the Cisco Certified Network Associate certification. This hardcover edition includes Sybex CompTIA Network+ Virtual Lab network simulator plus four additional bonus exams and 100 additional flashcards and is fully updated for...

iPhone 4 Made Simple
iPhone 4 Made Simple

Congratulations—you’ve purchased the new iPhone 4, the coolest smartphone on the market. Now it’s time to learn how to take advantage of all the features, apps, and secret techniques available. To accomplish this, look no further than iPhone 4 Made Simple. Over 1,000 screen visuals and clear-cut instructions guide...

Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

Out of the Inner Circle: A Hacker's Guide to Computer Security
Out of the Inner Circle: A Hacker's Guide to Computer Security

This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system....

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

CCNP Security Firewall 642-617 Official Cert Guide
CCNP Security Firewall 642-617 Official Cert Guide

CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Oracle BPM Suite 11g Developer's cookbook
Oracle BPM Suite 11g Developer's cookbook
Organizations find that it's the business process that constitutes the heart of an enterprise and is a differentiating factor. They've found that it's the processes that make or break an enterprise. Operational efficiency is a differentiating factor, and research shows that it's the processes that provide operational...
The Practice of Research on Migration and Mobilities (SpringerBriefs in Environment, Security, Development and Peace) (Volume 14)
The Practice of Research on Migration and Mobilities (SpringerBriefs in Environment, Security, Development and Peace) (Volume 14)

The migration process is interpreted in a different way when researchers live in so-called societies of origin, than when it is interpreted from societies of destination―even when research work is multi-situated. The localization of researchers in this field involves numerous factors that influence the modalities for conducting research....

CentOS 6 Linux Server Cookbook
CentOS 6 Linux Server Cookbook

An all-in-one guide to installing, configuring, and running a Centos 6 server. Ideal for newbies and old-hands alike, this practical tutorial ensures you get the best from this popular, enterprise-class free server solution.

  • Delivering comprehensive insight into CentOS server with a series of starting points that show you...
unlimited object storage image
Result Page: 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy