Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mac Security Bible
Mac Security Bible

Your essential, no-holds-barred guide to Mac security threats and solutions

Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into...

Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
Implementing VMware vCenter Server
Implementing VMware vCenter Server

A practical guide for deploying and using VMware vCenter, suitable for IT professionals

Overview

  • Gain in-depth knowledge of the VMware vCenter features, requirements, and deployment process
  • Manage hosts, virtual machines, and learn storage management in VMware vCenter server
  • ...
Cloud Computing and Software Services: Theory and Techniques
Cloud Computing and Software Services: Theory and Techniques

Thanks to its inherent resilience to failure and the increasing availability of open-source cloud infrastructure software and virtualization software stacks, services delivered from the cloud have expanded past web applications to include storage, raw computing, and access to specialized services. The possibility of satisfying maintenance and...

Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Mastering Microsoft Virtualization
Mastering Microsoft Virtualization

The first in-depth, comprehensive guide to Microsoft's suite of virtualization products

Virtualization is a hot topic for IT because of the potential it offers for serious economic benefits. While other books treat server virtualization alone, this comprehensive guide provides a complete virtual strategy.

You will learn how to...

Getting Started with Citrix® Provisioning Services 7.0
Getting Started with Citrix® Provisioning Services 7.0

Learning to install, configure, and manage Citrix Provisioning Services is made so much faster and simpler with this practical guide. Making no assumptions of prior knowledge, it takes you step by step through the product features.

Overview

  • Install and configure Citrix Provisioning Services quickly and...
Troubleshooting vSphere Storage
Troubleshooting vSphere Storage

All vSphere administrators will benefit big-time from this book because it gives you clear, practical instructions on troubleshooting a whole host of storage problems. From fundamental to advanced techniques, it’s all here.

Overview

  • Identify key issues that affect vSphere storage visibility,...
Virtualization with VMware ESX Server
Virtualization with VMware ESX Server

A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. VMware's ESX server is the enterprise tool that provides the platform on which a complete virtual infrastructure can be designed,...

Fundamentals of Linux: Explore the essentials of the Linux command line
Fundamentals of Linux: Explore the essentials of the Linux command line

Develop a solid understanding of the important command-line tools and utilities in Linux

Key Features

  • Delve into the fundamentals of Linux
  • Explore and work with virtualization, command lines, and Bash shell scripts
  • Use special file permission flags such as...
Business Intelligence and the Cloud: Strategic Implementation Guide (Wiley and SAS Business Series)
Business Intelligence and the Cloud: Strategic Implementation Guide (Wiley and SAS Business Series)

How to measure cloud computing options and benefits to impact business intelligence infrastructure

This book is a guide for managers and others involved in using cloud computing to create business value. It starts with a discussion of the media hype around cloud computing and attempt to pull together what industry experts...

Foundations of Green IT: Consolidation, Virtualization, Efficiency, and ROI in the Data Center
Foundations of Green IT: Consolidation, Virtualization, Efficiency, and ROI in the Data Center
“This book comprehensively discusses design considerations for the truly energy efficient data center.”

Scott Davis, Chief Data Center Architect, Office of the CTO, VMware, Inc.

 

This Book Isn’t About...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy