Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Server 2008: The Definitive Guide
Windows Server 2008: The Definitive Guide
This practical guide has exactly what you need to work with Windows Server 2008. Inside, you'll find step-by-step procedures for using all of the major components, along with discussions on complex concepts such as Active Directory replication, DFS namespaces and replication, network access protection, the Server Core edition, Windows PowerShell,...
My Palm Pre
My Palm Pre

Full-color, step-by-step tasks walk you through getting and keeping your Palm Pre working just the way you want. The tasks include:

•   Getting started quickly and making the most of Palm Pre’s amazing interface

...

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)

For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting...

Dr. Tom Shinder's Configuring ISA Server 2004
Dr. Tom Shinder's Configuring ISA Server 2004

This book is based in large part on our own trials and tribulations (as well as the occasional “Eureka!” moment) that we’ve experienced working with ISA Server 2004. In this book, we are talking to people much like ourselves—experienced Windows network administrators who want to secure their networks and speed up Web...

CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)

Here's the book you need to prepare for Cisco's Secure PIX Firewall (CSPFA) and Secure VPN (CSVPN) exams.

This two-in-one Study Guide provides:

  • In-depth coverage of all exam topics
  • Practical information on implementing Cisco's Secure PIX and Secure VPN technologies
  • ...
Practical Firewalls
Practical Firewalls
Practical Firewalls enables you to get a thorough understanding of all of the basic concepts involved in creating and maintaining a firewall. Aimed at beginning to intermediate network administrators, this book presents information in a manner so that you do not need a large background in the networking field. It provides "real world"...
CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide (Exams SECUR,CSPFA, CSVPN, CSIDS, and CSI)
CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide (Exams SECUR,CSPFA, CSVPN, CSIDS, and CSI)

Prepare to pass all five CCPS certification exams

Get complete coverage of all the material included on he Cisco Certified Security Professional Certification (CCSP) exams inside this comprehensive, up-to-date resource. With full treatment of all the exam topics, this definitive, dual-purpose tool contains helpful exam tips, sample...

Microsoft ISA Server 2006 Unleashed
Microsoft ISA Server 2006 Unleashed
It is rare to run into that one product that impresses technical audiences in the way that ISA Server has managed to. As I prepared to write this book, what surprised me was not ISA’s ability to wow and charm Microsoft-centric environments, but its ability to impress the Microsoft-skeptic crowds as well. These are the ones who have been...
Policy Routing Using Linux
Policy Routing Using Linux
Traditional IPv4 routing is summarized as "All routing is a destination driven process". When a router looks at an IPv4 packet it cares only about the destination address in the header of the packet. It uses this destination address to make a decision on where to forward the packet. But what if you want to route packets differently...
CCSA NG: Check Point Certified Security Administrator Study Guide
CCSA NG: Check Point Certified Security Administrator Study Guide
Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management I NG exam, #156-210. Written by a Check Point security expert who knows exactly what it takes to pass the test, this study guide provides:
  • Assessment testing to focus and direct your studies
  • In-depth...
Designing Network Security (2nd Edition) (Networking Technology)
Designing Network Security (2nd Edition) (Networking Technology)
Master the design of secure networks with the updated edition of this best-selling security guide

* Gain a comprehensive view of network security issues and concepts, then master specific implementations based on your network needs
* Learn how to use new and legacy Cisco Systems equipment to secure your networks
* Understand how
...

Microsoft DirectAccess Best Practices and Troubleshooting
Microsoft DirectAccess Best Practices and Troubleshooting

Secure and efficient functioning of your DirectAccess environment

Overview

  • Learn how to make Manage Out work for your DirectAccess clients without compromising your network
  • Learn how to understand enormous logfiles along with common troubleshooting criteria
  • Explore some...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy