Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

RT Essentials
RT Essentials

In a typical organization, there's always plenty that to do such as: pay vendors, invoice customers, answer customer inquiries, and fix bugs in hardware or software. You need to know who wants what and keep track of what is left to do.

This is where a ticketing system comes in. A ticketing system...

ITV Handbook: Technologies and Standards
ITV Handbook: Technologies and Standards

Interactive television (iTV)—an evolutionary merging of digital TV and the Internet—is set to take the world by storm! For consumers, iTV technology offers powerful new ways to interact with content providers and merchants. These include enjoying video on demand; participating in online shopping, banking, and...

Sun (R) Certified System Administrator for Solaris (TM) 10 Study Guide (Exams 310-200 & 310-202)
Sun (R) Certified System Administrator for Solaris (TM) 10 Study Guide (Exams 310-200 & 310-202)

Get the book that shows you not only what—but how—to study

  • 100% complete coverage of all official objectives for Sun Solaris exams CX-310-200 and CX-310-202
  • Exam Readiness Checklist at the front of the book--you're ready for the exam when all objectives on the list are checked off...
Java 2 Core Language Little Black Book
Java 2 Core Language Little Black Book
The Java 2 Core Language Little Black Book is a compact, detailed reference for intermediate to experienced programmers and managers who are ready to learn how to build Java programs. The book features a logical, sequential approach with concise overviews and step-by-step, ready-to-use solutions created by a master Java programmer. This book is...
Professional Windows PowerShell (Programmer to Programmer)
Professional Windows PowerShell (Programmer to Programmer)
Professional Windows® PowerShell

Forget everything you know about the Windows command line because you're about to enter a whole new ballgame. Windows PowerShell provides a new environment for interactive exploration and administration of Windows machines that's different from and more consistent than what you've previously used on Windows...

IP Networking over Next-Generation Satellite Systems: International Workshop, Budapest, July 2007
IP Networking over Next-Generation Satellite Systems: International Workshop, Budapest, July 2007
With the boom of Internet, IP-based applications, such as WWW and multimedia, bave been an essential part of our life, and there is an ever-increasing demand for accessing high-speed Internet services anywhere and anytime. This trend unavoidably has huge impacts on the design of the next-generation satellite systems. On the other hand, with its...
A Developer's Guide to Data Modeling for SQL Server: Covering SQL Server 2005 and 2008
A Developer's Guide to Data Modeling for SQL Server: Covering SQL Server 2005 and 2008
Model SQL Server Databases That Work Better, Do More, and Evolve More Smoothly

Effective data modeling is essential to ensuring that your databases will perform well, scale well, and evolve to meet changing requirements. However, if you’re modeling databases to run on Microsoft SQL Server 2008 or 2005, theoretical
...
Drupal 6 Social Networking
Drupal 6 Social Networking
Build a social or community web site, with friends lists, groups, custom user profiles, and much more
  • Step-by-step instructions for putting together a social networking site with Drupal 6
  • Customize your Drupal installation with modules and themes to match the needs of almost any social networking site
  • ...
Cyber Risks for Business Professionals: A Management Guide
Cyber Risks for Business Professionals: A Management Guide

The benefits which Internet technologies offer to business professionals also present considerable risks. The management of these risks is the focus of this book.

Realize the benefits of Internet technologies, while ensuring your company is protected from the associated risks!

An effective risk management...

Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management

Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in...

Mastering System Center 2012 R2 Configuration Manager
Mastering System Center 2012 R2 Configuration Manager

Invaluable coverage on all aspects of System Center 2012 R2 Configuration Manager

Completely updated for System Center 2012 R2 Configuration Manager, this comprehensive book provides intermediate and advanced coverage of all aspects of the product, including planning and installation, migrating from previous versions of...

unlimited object storage image
Result Page: 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy