 |
|
 How to Cheat at Microsoft Vista AdministrationThe Perfect Reference for the Multitasked SysAdmin The Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances the systems reliability,... |  |  CCIE Security Exam Certification Guide (CCIE Self-Study)Official self-study test preparation guide for the CCIE Security written exam
Review all CCIE Security written exam topics, including:
- Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
- DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
|  |  Cisco Express Forwarding (Networking Technology)How does a router switch a packet? What is the difference between routing a packet, switching a frame, and packet switching? What is the Cisco® Express Forwarding (CEF) feature referred to in Cisco documentation and commonly found in Cisco IOS® commands? CEF is a general term that describes the mechanism by which Cisco routers and... |
|
 Internetworking Troubleshooting HandbookIf you can think of the problem, Internetworking Troubleshooting Handbook probably has the solution--at least when it comes to networking problems. This 714-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of networking woes, you will find pragmatic tips that can help you through an... |  |  Linux on IBM eserver zSeries and S/390: Best Security PracticesThis IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
... |  |  |
|
 Open Source Security Tools: Practical Guide to Security Applications, A
Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.
Written with the harried IT manager in mind, Open Source Security Tools is a practical,... |  |  Windows 2000 Active DirectoryActive Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primary benefits of Active Directory Services are its extensibility, scalability, and ease of management as compared to prior generations of Windows NT. If you are a... |  |  Planning for Survivable NetworksKeep your network safe from security disasters with a dependable recovery strategy
Companies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.
In the information-packed pages of this book, Annlee Hines shares her... |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |