Home | Amazing | Today | Tags | Publishers | Years | Search 
Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer....

PHP and MySQL Web Development (4th Edition) (Developer's Library)
PHP and MySQL Web Development (4th Edition) (Developer's Library)

PHP and MySQL are popular open-source technologies that are ideal for quickly developing database-driven Web applications. PHP is a powerful scripting language designed to enable developers to create highly featured Web applications quickly, and MySQL is a fast, reliable database that integrates well with PHP and is suited for dynamic...

Learning XNA 3.0: XNA 3.0 Game Development for the PC, Xbox 360, and Zune
Learning XNA 3.0: XNA 3.0 Game Development for the PC, Xbox 360, and Zune
Do you have what it takes to become a game developer? With this hands-on book, you'll learn quickly and easily how to develop computer games with Microsoft's XNA 3.0 framework-not just for your PC, but for Xbox 360 and the Microsoft Zune as well.

Written by an experienced university-level game development instructor, Learning
...
Winning Results with Google AdWords, Second Edition
Winning Results with Google AdWords, Second Edition
Run a Profitable Google AdWords Campaign

Reach millions of targeted new customers at the precise moment theyAnd#39;re looking for the products and services youAnd#39;re selling with help from this hands-on guide. Winning Results with Google AdWords, Second Edition reveals the latest strategies for writing successful...

LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

JBoss in Action: Configuring the JBoss Application Server
JBoss in Action: Configuring the JBoss Application Server
JBoss in Action is the first book to focus on teaching readers in detail how to use the JBoss application server. Unlike other titles about JBoss, the authors of JBoss in Action go deeper into the advanced features and configuration of the server. In particular, it focuses on enterprise-class topics, such as high availability,...
Silverlight 2 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
Silverlight 2 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
Microsoft .NET Architect Evangelist, Jit Ghosh, presents a practical companion guide to developing rich, interactive web applications with Silverlight 2. Common problems, issues, and every–day scenarios are tackled with a detailed discussion of the solution and ready–made code recipes that will save you hours of coding...
Groovy and Grails Recipes (Recipes: a Problem-Solution Approach)
Groovy and Grails Recipes (Recipes: a Problem-Solution Approach)
Groovy and Grails Recipes is the busy developers’ guide for developing applications in Groovy and Grails. Rather than boring you with theoretical knowledge of “yet another language/framework,” this book delves straight into solving real–life problems in Groovy and Grails using easy–to–understand,...
Adaptation and Cross Layer Design in Wireless Networks (Adaptation in Wireless Communications)
Adaptation and Cross Layer Design in Wireless Networks (Adaptation in Wireless Communications)
Adaptive techniques play a key role in modern wireless communication systems. The concept of adaptation is emphasized in the Adaptation in Wireless Communications Series through a unified framework across all layers of the wireless protocol stack ranging from the physical layer to the application layer, and from cellular systems to...
Advances in Ubiquitous Computing: Future Paradigms and Directions
Advances in Ubiquitous Computing: Future Paradigms and Directions
The development and availability of new computing and communication devices, and the increased connectivity between these devices, thanks to wired and wireless networks, are enabling new opportunities for people to perform their operations anywhere and anytime. This technological expansion has developed a multitude of challenges that demand further...
Expert Witnessing in Forensic Accounting: A Handbook for Lawyers and Accountants
Expert Witnessing in Forensic Accounting: A Handbook for Lawyers and Accountants
The book provides well-reasoned advice to teach the ins and outs of expert witnessing that is specifically oriented toward accounting. …this is a highly recommended read.
- in Readers Preference Reviews

From opposing the local CPA to tackling the Big Five - Everything you need to know about accounting in the courtroomWith
...
Result Page: 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy