Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
vSphere Virtual Machine Management
vSphere Virtual Machine Management

This book follows a step-by-step tutorial approach with some real-world scenarios that vSphere businesses will be required to overcome every day. This book also discusses creating and configuring virtual machines and also covers monitoring virtual machine performance and resource allocation options.

This book is for VMware
...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This...

CompTIA Network+ N10-006 Cert Guide
CompTIA Network+ N10-006 Cert Guide

This approved study guide helps you master topics on the CompTIA Network+ N10-006 exam, including the following:

  •  Computer network fundamentals
  • The OSI model and TCP/IP stack
  • ...
Mastering VMware Horizon 6
Mastering VMware Horizon 6

Unlock the advanced features and full power of VMware Horizon 6 to deliver the industry's most comprehensive end-to-end user experience

About This Book

  • Learn why a EUC strategy is important, what it can deliver, and the approach you should take when starting out with your own project
  • ...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

VMware ESX Server: Advanced Technical Design Guide (Advanced Technical Design Guide series)
VMware ESX Server: Advanced Technical Design Guide (Advanced Technical Design Guide series)
Detailing the design and deployment of a VMware ESX Server environment, and written from the practical experience of proven VMware engineers, this book provides IT architects with the insight needed to tackle tough design issues such as ESX Server security, network and SAN design, host hardware selection, guest selection and configuration,...
PowerCLI Cookbook
PowerCLI Cookbook

Over 75 step-by-step recipes to put PowerCLI into action for efficient administration of your virtual environment

About This Book

  • Solve complex problems in vSphere by creating custom PowerCLI routines that can be accessed with simple native commands
  • Explore specific use cases...
The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to...
VMware vCenter Operations Manager Essentials
VMware vCenter Operations Manager Essentials

This book, written by an expert, tackles the complexities of the vCenter Operations Management Suite to make your life easier. Its step-by-step approach brings a new level of clarity to administering large virtual machines.

Overview

  • Written by VMware expert Lauren Malhoit, this book takes a look at...
vSphere High Performance Cookbook
vSphere High Performance Cookbook

VMware vSphere is the key virtualization technology in today’s market. vSphere is a complex tool and incorrect design and deployment can create performance-related problems. vSphere High Performance Cookbook is focused on solving those problems as well as providing best practices and performance-enhancing techniques.

vSphere...

VMware View Security Essentials
VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy