|
|
How to Cheat at Windows System Administration Using Command Line ScriptsIf you want to streamline the administration of your Windows servers and workstations by using command line scripts, this is the book for you! With every new version of Windows, Microsoft attempts to ease administrative tasks by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these... | | Virtualization with Microsoft Virtual Server 2005A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of... | | |
|
How to Cheat at Managing Information SecurityInformation security is different from many other disciplines both within mainstream information technology and other business areas. Even though there are now many good books on various areas, getting the breadth of knowledge across the many subareas is still difficult, but it is essential to success.
Unlike so many... | | Wardriving & Wireless Penetration TestingWireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.
Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily... | | BigNum Math: Implementing Cryptographic Multiple Precision ArithmeticThe origins of this book are part of an interesting period of my life. A period that saw me move from a shy and disorganized young adult, into a software developer who has toured various parts of the world, and met countless new friends and colleagues. It all began in December of 2001, nearly five years ago. I started a project... |
|
|
Fisma Certification & Accreditation HandbookThe only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.
This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three... | | Configuring Juniper Networks NetScreen & SSG FirewallsJuniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.
Configuring... | | |
|
Result Page: Previous 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 Next |