Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Guide to Wireless Network Security
Guide to Wireless Network Security

With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,...

Windows Server 2008 Hyper-V Unleashed
Windows Server 2008 Hyper-V Unleashed
Hyper-V is Microsoft’s server virtualization technology built-in to Windows Server 2008.  Virtual Machine Manager 2008 is a System Center add-on that helps organizations better manage their virtual guest images, delegate administration and management, and even extract virtual images from existing physical and virtual servers.  This...
ERP:Making It Happen: The Implementers' Guide to Success with Enterprise Resource Planning
ERP:Making It Happen: The Implementers' Guide to Success with Enterprise Resource Planning

Follow the "Proven Path" to successful implementation of enterprise resource planning

Effective forecasting, planning, and scheduling is fundamental to productivity–and ERP is a fundamental way to achieve it. Properly implementing ERP will give you a competitive advantage and help you run your business more...

Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)

Cisco® Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco...

Law Express: Intellectual Property Law (Revision Guide)
Law Express: Intellectual Property Law (Revision Guide)
Intellectual property law is a demanding but enjoyable subject. It covers a range of rights, some of which have little in common with others. Students should keep in mind that, although some rights may be quite different to others, a number of rights may exist in respect of the same subject matter. For example, a new design of...
Practical IPv6 for Windows Administrators
Practical IPv6 for Windows Administrators

Practical IPv6 for Windows Administrators is a handy guide to implementing IPv6 in a Microsoft Windows environment. This is the book you need if you are a Microsoft Windows Administrator confronted with IPv6 and in need of a quick resource to get up and going. The book covers the current state of IPv6 and its support in Microsoft...

How to Build Android Apps with Kotlin: A hands-on guide to developing, testing, and publishing your first apps with Android
How to Build Android Apps with Kotlin: A hands-on guide to developing, testing, and publishing your first apps with Android

Master the fundamentals of Android programming and apply your skills to create scalable and reliable apps using industry best practices

Key Features

  • Build apps with Kotlin, Google's preferred programming language for Android development
  • Unlock solutions to development...
Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

XML in 60 Minutes a Day
XML in 60 Minutes a Day
Get up and running with XML using this innovative virtual classroom approach!

Interested in mastering XML? This revolutionary book and companion online presentation take you through 16 one-hour lessons that quickly get you up to speed on many of XML’s capabilities. With this unique approach and real-world perspective, you’ll be able...

unlimited object storage image
Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy