|
|
|
|
|
Hack I.T.: Security Through Penetration TestingPenetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from... | | DB2 9 Fundamentals Certification Study GuideStarting with the certification process itself and ending with the concept of isolation levels and locking, this guide covers everything needed to know to pass the DB2 9 Fundamentals Certification Exam (Exam 730). The prerequisite for all intermediate and follow-on DB2 certifications, XML usage, basic table creation, a rich set of sample... | | Mac OS X Snow Leopard Server For DummiesMaking Everything Easier!
Mac OS® X Snow Leopard Server for Dummies
Learn to:
-
Set up and configure a Mac network with Snow Leopard Server
-
Administer, secure, and troubleshoot the network
-
Incorporate a Mac subnet into a Windows Active... |
|
|
|
|
Result Page: 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 |