Home | Amazing | Today | Tags | Publishers | Years | Search 
JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

Microsoft Outlook 2010 Inside Out
Microsoft Outlook 2010 Inside Out

You're beyond the basics, so dive right in and take control of your schedule and business communications from the inside out! This in-depth reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds in a supremely organized format. It's all muscle and no fluff. Discover how the experts manage...

Mac OS X System Administration
Mac OS X System Administration

Build and manage a powerful network on Mac OS X Server

Boost productivity and foster collaboration using the powerful networking tools available in Mac OS X Snow Leopard Server. With clear, detailed explanations and step-by-step instructions, Mac OS X System Administration shows you how to plan, construct, and manage a...

Cisco LAN Switching Configuration Handbook (2nd Edition)
Cisco LAN Switching Configuration Handbook (2nd Edition)

Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series...

iPad & iPhone Administrator's Guide: Enterprise Deployment Strategies and Security Solutions
iPad & iPhone Administrator's Guide: Enterprise Deployment Strategies and Security Solutions

Securely deploy iPads and iPhones on corporate networks

Seamlessly integrate iPads and iPhones into your company's IT systems using the detailed instructions contained in this practical book. iPad & iPhone Administrator's Guide shows you how to use iPads and iPhones as business devices and manage them tightly...

Deploying Microsoft Forefront Unified Access Gateway 2010
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Windows Small Business Server 2011 Administrator's Companion
Windows Small Business Server 2011 Administrator's Companion

If you run a small business, you don’t need us to tell you that the highly competitive marketplace, unpredictable economic cycles, time pressures, and technological demands are constantly exerting pressure on your bottom line.

Your business needs the same technologies that large companies do. You need the...

Mobile Device Security For Dummies
Mobile Device Security For Dummies

The information you need to avoid security threats on corporate mobile devices

Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a...

Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
My DROID: (Covers DROID 3/Milestone 3, DROID Pro, DROID X2, DROID Incredible 2/Incredible S, and DROID CHARGE)
My DROID: (Covers DROID 3/Milestone 3, DROID Pro, DROID X2, DROID Incredible 2/Incredible S, and DROID CHARGE)

My Droid 2/e covers the following Android phones:

 

DROID 3/Milestone 3, DROID Pro/Motorola Pro and DROID X2 by Motorola, DROID Incredible 2/Incredible S by HTC, and DROID CHARGE by Samsung

 

...
Implementing Netscaler VPX
Implementing Netscaler VPX

Leverage the features of NetScaler VPX™ to optimize and deploy responsive web services and applications on multiple virtualization platforms

Overview

  • Learn how to design, set up, and deploy Netscaler VPX in a virtual environment to make all your Web applications faster and secure
  • ...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy