Home | Amazing | Today | Tags | Publishers | Years | Search 
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Deploying LINUX on the Desktop
Deploying LINUX on the Desktop
Covering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!

Looking at the world of the
...
Clustering Windows Server: A Road Map for Enterprise Solutions
Clustering Windows Server: A Road Map for Enterprise Solutions
During the final decade of the twentieth century, Microsoft achieved historic levels of marketing success in the computing business. Microsoft offered an alternative so economically appealing to the computing industry that resistance seemed futile in all but a few cases.

Two questions remain. First, “Is there a solution to the
...
Oracle 10g Developing Media Rich Applications
Oracle 10g Developing Media Rich Applications
Integrating Multimedia features in databases in one of the most important new applications in the last 20 years

Oracle 10g Developing Media Rich Applications is focused squarely on database administrators and programmers as the foundation of multimedia database applications. With the release of Oracle8 Database in 1997,
...
Open Source Software: Implementation and Management
Open Source Software: Implementation and Management
Open source software is now under serious consideration in many organizations.
The success of several open source products, particularly Apache and
Linux, in the enterprise has come surprisingly quickly, given that they were
not commercially available ten years ago. It is important for managers
responsible for adopting
...
Netware Administration
Netware Administration
NetWare Administration contains information from a consultant's or administrator's viewpoint. There are no other NetWare books like it. The author went right to the meat-the NetWare client starts Chapter 1. This book provides tips, tricks, high-level explanations and Foust's hardcore experience in the field for Novell. He includes information that...
Microsoft Outlook Programming, Jumpstart for Administrators, Developers, and Power Users
Microsoft Outlook Programming, Jumpstart for Administrators, Developers, and Power Users
Microsoft Outlook Programming unleashes the power of Microsoft Outlook, allowing administrators and end users to customize Outlook in the same way that they've used macros and templates to customize other programs like Excel and Word. Experienced developers will find the quick-start information they need to begin integrating Outlook into their...
Firewalls: Jumpstart for Network and Systems Administrators
Firewalls: Jumpstart for Network and Systems Administrators
Security advice for any organization from a consultant with decades of experience

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement
...
Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management
Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management
Data mining exploits the knowledge that is held in the enterprise data store by examining the data to reveal patterns that suggest better ways to produce profit, savings, higher-quality products, and greater customer satisfaction. Just as the lines on our faces reveal a history of laughter and frowns, the patterns embedded in data reveal a history...
High Performance Data Network Design (IDC Technology)
High Performance Data Network Design (IDC Technology)
The proliferation and complexity of data networks today is challenging our ability to design and manage them effectively. A new generation of Internet, e-commerce, and multimedia applications has changed traditional assumptions on traffic dynamics, and demands tight quality of service and security guarantees. These issues, combined with the...
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond does it again! He provides detailed real-world information that will make you an expert on Exchange 2003. This book is a clear, to-the-point source of information filled with sound practical advice. Whether you're new to Exchange or upgrading your existing Exchange
systems, this detailed guide can help you tap all the power,
...
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy