|
|
Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... | | Deploying LINUX on the DesktopCovering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!
Looking at the world of the... | | Clustering Windows Server: A Road Map for Enterprise SolutionsDuring the final decade of the twentieth century, Microsoft achieved historic levels of marketing success in the computing business. Microsoft offered an alternative so economically appealing to the computing industry that resistance seemed futile in all but a few cases.
Two questions remain. First, “Is there a solution to the... |
|
Oracle 10g Developing Media Rich ApplicationsIntegrating Multimedia features in databases in one of the most important new applications in the last 20 years
Oracle 10g Developing Media Rich Applications is focused squarely on database administrators and programmers as the foundation of multimedia database applications. With the release of Oracle8 Database in 1997,... | | Open Source Software: Implementation and ManagementOpen source software is now under serious consideration in many organizations. The success of several open source products, particularly Apache and Linux, in the enterprise has come surprisingly quickly, given that they were not commercially available ten years ago. It is important for managers responsible for adopting... | | Netware AdministrationNetWare Administration contains information from a consultant's or administrator's viewpoint. There are no other NetWare books like it. The author went right to the meat-the NetWare client starts Chapter 1. This book provides tips, tricks, high-level explanations and Foust's hardcore experience in the field for Novell. He includes information that... |
|
| | Firewalls: Jumpstart for Network and Systems AdministratorsSecurity advice for any organization from a consultant with decades of experience
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement... | | |
|
High Performance Data Network Design (IDC Technology)The proliferation and complexity of data networks today is challenging our ability to design and manage them effectively. A new generation of Internet, e-commerce, and multimedia applications has changed traditional assumptions on traffic dynamics, and demands tight quality of service and security guarantees. These issues, combined with the... | | Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)Tony Redmond does it again! He provides detailed real-world information that will make you an expert on Exchange 2003. This book is a clear, to-the-point source of information filled with sound practical advice. Whether you're new to Exchange or upgrading your existing Exchange systems, this detailed guide can help you tap all the power,... | | Physical Security for IT"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each... |
|
Result Page: 7 6 5 4 3 2 1 |