Home | Amazing | Today | Tags | Publishers | Years | Search 
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Higher National Computing, Second Edition: Core Units for BTEC Higher Nationals in Computing and IT
Higher National Computing, Second Edition: Core Units for BTEC Higher Nationals in Computing and IT
Higher National Computing 2e is a new edition of this extremely successful course book, updated specifically to cover the compulsory core units of the 2003 BTEC Higher National Computing schemes. Full coverage is given of the four core units for HNC, the two additional core units required at HND, and the Core Specialist Unit...
Agent Communication II: International Workshops on Agent Communication, AC 2005 and AC 2006, Utrecht, Netherlands, July 25, 2005, and Hakodate, Japan
Agent Communication II: International Workshops on Agent Communication, AC 2005 and AC 2006, Utrecht, Netherlands, July 25, 2005, and Hakodate, Japan
This book constitutes the thoroughly refereed post-proceedings of the two International Workshops on Agent Communication, AC 2005 and AC 2006, held in Utrecht, Netherlands in July 2005, and in Hakodate, Japan in May 2006 as associated events of AAMAS 2005/2006, the main international conference on autonomous agents and multi-agent systems.

The...

Implementing Email and Security Tokens: Current Standards, Tools, and Practices
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
It's your job to make email safe.

Where do you start?

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the...

Network Simulation Experiments Manual (The Morgan Kaufmann Series in Networking)
Network Simulation Experiments Manual (The Morgan Kaufmann Series in Networking)
Networking technologies and concepts are often difficult to explain, even through careful description and well thought out examples. One method for making this information "stick" is done by creating an environment where networking professionals and students can visualize how networks work, utilizing a software tool that simulates the...
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond does it again! He provides detailed real-world information that will make you an expert on Exchange 2003. This book is a clear, to-the-point source of information filled with sound practical advice. Whether you're new to Exchange or upgrading your existing Exchange
systems, this detailed guide can help you tap all the power,
...
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
Acustomer stumbling upon this book in a bookstore might ask, “Why is a book on directories and security is so important?”

The Internet is connecting enterprises into a global economy, and the interaction of directories is critical to the success of the New Economy. Consider, for example, Internet commerce in the United
...
Beginning Ubuntu Linux, Third Edition (Beginning from Novice to Professional)
Beginning Ubuntu Linux, Third Edition (Beginning from Novice to Professional)
Beginning Ubuntu Linux, the award–winning and best–selling Ubuntu book for beginners, is now in its third edition, presenting readers with an up–to–the–minute introduction to the world of Linux and the open source community. A detailed overview of Ubuntu’s installation and configuration process...
Wikipedia: The Missing Manual
Wikipedia: The Missing Manual
What made you write the book? In November 2006 I started working on an index for editors of Wikipedia – a single page that had links to all relevant policies, guidelines, how-to pages, reference pages, tools, and other things that an editor might conceivably want to read. The more I worked on the index, the...
Wireless Communications Security (Artech House Universal Personal Communications)
Wireless Communications Security (Artech House Universal Personal Communications)
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography...
Computational Geometry: Algorithms and Applications
Computational Geometry: Algorithms and Applications
This well-accepted introduction to computational geometry is a textbook for high-level undergraduate and low-level graduate courses. The focus is on algorithms and hence the book is well suited for students in computer science and engineering. Motivation is provided from the application areas: all solutions and techniques from computational...
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Result Page: 821 820 819 818 817 816 815 814 813 812 811 810 809 808 807 806 805 804 803 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy