Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Portable DBA: SQL Server
Portable DBA: SQL Server

Carry essential SQL Server administration information and troubleshooting techniques along with you so you can handle a wide variety of tasks on the spot. This handy resource offers fast access to administrative commands, syntax diagrams, error resolutions, best practices, and more. With coverage of the most commonly used SQL Server...

Security+ Study Guide, 2nd Edition (SYO-101)
Security+ Study Guide, 2nd Edition (SYO-101)
Here's the book you need to prepare for CompTIA's Security+ exam. This updated edition of the best-selling Security+ Study Guide was developed to meet the exacting requirements of today's certification candidates and aspiring IT security professionals. In addition to the consistent and accessible instructional...
Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Wi-Fi Home Networking
Wi-Fi Home Networking

For many professionals, wireless home computer networking delivers the power of corporate technology — without the hassles of corporate living, and the mobile connectivity to all of the computers throughout your home (or backyard) — without rewiring.

That’s why if you plan to set up a wireless...

Inside Internet Security: What Hackers Don't Want You To Know
Inside Internet Security: What Hackers Don't Want You To Know
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business....
Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
Microsoft  Office Outlook  2007 Inside Out
Microsoft Office Outlook 2007 Inside Out
Learn everything you need to know for working with Microsoft Office Outlook 2007from the inside out! This book packs hundreds of time-saving solutions, troubleshooting tips, and workarounds for using Office Outlook 2007all in concise, fast-answer format. Whether you are upgrading from Office 97 or Office 2003, youll be able to dig in to the...
Microsoft Visual Basic: Developer's Workshop
Microsoft Visual Basic: Developer's Workshop

The authors of this guide present a smorgasbord of tips and techniques for Visual Basic developers. The first part details the new features of Visual Basic 6 and lays out conventions for clear and productive programming style. However, these important preliminary discussions are covered in only two quick chapters, and most of the book is...

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Internet Communication and Qualitative Research: A Handbook for Researching Online (New Technologies for Social Research series)
Internet Communication and Qualitative Research: A Handbook for Researching Online (New Technologies for Social Research series)
"The internet is exploding with possibilities for conducting social research. Mann and Stewart offer the first in-depth consideration of the prospects and potentials for doing qualitative research on-line. This wide ranging, clearly-written book is essential reading for researchers working at the cutting edge of qualitative methodology."...
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources...
Design on the Edge: The Making of a High-Performance Building
Design on the Edge: The Making of a High-Performance Building
This is the story of a small building in Ohio that was one of the first, if not the first, substantially green or high-performance buildings on a college campus. It spans the decade between 1995 and 2005. In that time, Americans impeached a president, balanced the federal budget and then unbalanced it again, witnessed the largest corporate...
unlimited object storage image
Result Page: 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy