 |
|
|
 Mastering VMware Infrastructure 3Transform your IT infrastructure without extra hardware
Cut hardware costs, expand your capacity, and manage an entire fleet of virtual machines in your enterprise with the leading virtualization solution, VMware Infrastructure 3 (VI3), and the step-by-step instruction in this must-have guide. This essential book is packed... |  |  Nessus Network Auditing, Second EditionIn the war zone that is the modern Internet, manually reviewing each networked system for security fl aws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack.
... |  |  Dreamweaver MX: A Beginner's GuideEssential Skills--Made Easy!
Develop and deploy Web sites with Macromedia's unique Dreamweaver MX development environment. Get a complete introduction to this popular software's tools, features, and potent functionality. Web experts Ray West and Tom Muck will lead you through all the essentials while focusing on real-world implementation. Begin... |
|
|
 IBM Cognos 8 Business Intelligence: The Official GuideThe Only Authorized Guide to IBM Cognos 8 Business Intelligence
Develop, deploy, and maintain a complete BI solution across your enterprise. IBM Cognos 8 Business Intelligence: The Official Guide shows you how to take full advantage of the robust service-oriented architecture and simplified role-based user... |  |  ACE the IT ResumeCreate a first-rate resume that will get you hired in IT
Stand out in a crowd of IT job applicants by creating and submitting a winning resume and cover letter with help from this practical guide. Fully revised and updated for the latest trends, technologies, and in-demand jobs, Ace the IT Resume, Second... |  |  Maximum Linux Security (2nd Edition)Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.
Maximum Linux Security helps Linux administrators identify and plug security holes... |
|
| Result Page: 1093 1092 1091 1090 1089 1088 1087 1086 1085 1084 1083 1082 1081 1080 1079 1078 1077 1076 1075 |