Mostrando 21,641 - 21,660 Resultados de 22,085 Para Buscar '"maní"', tiempo de consulta: 0.10s Limitar resultados
  1. 21641
    por Alger, Douglas
    Publicado 2005
    “…A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company’s valuable information. …”
    Libro electrónico
  2. 21642
    Publicado 2007
    “…Coverage includes: Why conventional bug-catching often misses security problems How static analysis can help programmers get security right The critical attributes and algorithms that make or break a static analysis tool 36 techniques for making static analysis more effective on your code More than 70 types of serious security vulnerabilities, with specific solutions Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more Techniques for handling untrusted input Eliminating buffer overflows: tactical and strategic approaches Avoiding errors specific to Web applications, Web services, and Ajax Security-aware logging, debugging, and error/exception handling Creating, maintaining, and sharing secrets and confidential information Detailed tutorials that walk you through the static analysis process “We designed Java so that it could be analyzed statically. …”
    Libro electrónico
  3. 21643
    Publicado 2006
    “…A practical guide for comparing, designing, and deploying IPsec, MPLS Layer 3, L2TPv3, L2TPv2, AToM, and SSL virtual private networks Explore the major VPN technologies and their applications, design, and configurations on the Cisco IOS® Router, Cisco® ASA 5500 Series, and the Cisco VPN 3000 Series Concentrator platforms Compare the various VPN protocols and technologies, learn their advantages and disadvantages, and understand their real-world applications and methods of integration Find out how to design and implement Secure Socket Layer (SSL) VPNs, including consideration of clientless operation, the Cisco SSL VPN Client, the Cisco Secure Desktop, file and web server access, e-mail proxies, and port forwarding Learn how to deploy scalable and secure IPsec and L2TP remote access VPN designs, including consideration of authentication, encryption, split-tunneling, high availability, load-balancing, and NAT transparency Master scalable IPsec site-to-site VPN design and implementation including configuration of security protocols and policies, multiprotocol/ multicast traffic transport, NAT/PAT traversal, quality of service (QoS), Dynamic Multipoint VPNs (DMVPNs), and public key infrastructure (PKI) Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. However, with so many flavors of VPNs available, companies and providers are often hard pressed to identify, design, and deploy the VPN solutions that are most appropriate for their particular network architecture and service needs. …”
    Libro electrónico
  4. 21644
    Publicado 2007
    “…The Smart Way to StudyTM In This Book You’ll Learn How To: Understand the impact of the latest improvements in Windows ServerTM 2003 on Active Directory, including Service Pack 1 (SP1) and Release 2 (R2) Plan an Active Directory infrastructure, including forests, trees, domains, organizational units (OUs), sites, global catalogs, and operations masters Install Active Directory domain controllers in forest roots, child domains, and additional domain controllers Plan and implement trust relationships within and between Active Directory forests, Windows NT 4.0 domains, and Kerberos realms Configure Active Directory sites, including site boundaries, links, link bridges, and replications Manage, monitor, maintain, and restore the Active Directory infrastructure Plan and implement user and group strategies, including security and distribution groups, organizational unit structures, and user authentication strategies Plan the application of Group Policy to users, computers, sites, domains, and organizational units Use Group Policy to configure the user and computer environment, including software distribution and upgrade, certificate enrollment, security settings, folder redirection, and many other available policy settings Use Resultant Set of Policy (RSoP) and other tools to manage and troubleshoot Group Policy WRITTEN BY A LEADING 70-294 EXAM EXPERT! …”
    Libro electrónico
  5. 21645
    por Abelar, Greg
    Publicado 2005
    “…Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a “black-box-voodoo” technology that is very sophisticated and intimidating. …”
    Libro electrónico
  6. 21646
    Publicado 2007
    “…. · Includes a chapter on troubleshooting, plus many insider tips, notes, and cautions throughout all chapters. · Shows you ho..…”
    Libro electrónico
  7. 21647
    Publicado 2006
    “…The book places an emphasis on configuring Cisco Catalyst switches with Cisco IOS® Software, with many chapters covering both Cisco IOS and Cisco CatOS. …”
    Libro electrónico
  8. 21648
    Publicado 2004
    “…Cisco Systems has continued the support and development of the PIX OS to provide networks top-notch security while maintaining compatibility with the latest standards and protocols. Now offered in many models, the PIX Firewall is perfectly suited to meet the requirements of small offices (501 model), medium to large businesses (506E, 515E, and 525 models), and large enterprise and service provider customers (525 and 535 models and the Firewall Services Module). …”
    Libro electrónico
  9. 21649
    Publicado 2007
    “…The authors cover Ubuntu 7.04 from start to finish: installation, configuration, desktop productivity, games, management, support, and much more. Among the many new topics covered in this edition: Ubuntu's expanded multimedia functionality and Edubuntu offerings geared for schools and educational settings. …”
    Libro electrónico
  10. 21650
    por Bott, Ed
    Publicado 2007
    “…Ed Bott is an award-winning computer journalist and one of the most widely recognized voices in the computing world, with nearly two decades of experience as a writer and editor at leading magazines, such as PC World, PC Computing, and Smart Business. Ed has written many of Que’s all-time bestsellers, including Special Edition Using Office 2000, Special Edition Using Windows 98, and Special Edition Using Windows Me. …”
    Libro electrónico
  11. 21651
    por Sells, Chris
    Publicado 2004
    “….” — Pierre Nallet , DevelopMentor Instructor “Chris does a nice job of presenting the core elements of WinForms complete with many concise samples and graphic depictions of UI features in action. …”
    Libro electrónico
  12. 21652
    por Sayles, Leonard R.
    Publicado 2006
    “…Seeking unprecedented individual gains, many members of the business community forgot their commitment to personal integrity, which maintains an essential trust among strangers, which binds all members in the larger society." …”
    Libro electrónico
  13. 21653
    Publicado 2005
    “…Synthetic Strategies including Collar, Synthetic Call, Synthetic Put, Synthetic Straddles, Synthetic Futures, Combos, Box Spread... ...and many more strategies... Plus essential tax-saving information, and more! …”
    Libro electrónico
  14. 21654
    por Harold, Elliotte Rusty
    Publicado 2003
    “…In addition, the book covers many useful supplements to these core APIs, including XPath, XSLT, TrAX, and JAXP. …”
    Libro electrónico
  15. 21655
    Publicado 2008
    “…In his eight years with Ascolta, Brandon has developed and taught many private Cisco cour..…”
    Libro electrónico
  16. 21656
    Publicado 2009
    “…—Michael Peachey, co-founder of General Interface and Director of User Experience, TIBCO Software Anil Gurnani has written extensively on technical topics for many prestigious magazines. He is an adjunct at SCPS, New York University, where he teaches advanced courses focused on web and enterprise technologies including Core Java, JEE, and .NET. …”
    Libro electrónico
  17. 21657
    Publicado 2009
    “…Best of all, George presents many of his own creative trading methods including his Natural Number Method, explained for the first time in this book.”…”
    Libro electrónico
  18. 21658
    por Augen, Jeffrey
    Publicado 2009
    “…You’ll master trades designed to profit from rising or falling stock prices, rising or falling volatility, time decay, rapid price spikes, and many other market dynamics. Each section helps you build your skills one trade at a time---whether you’re new to options or you’ve been trading for years. …”
    Libro electrónico
  19. 21659
    Publicado 2009
    “…Kissell also looks at software that makes it possible to run Windows programs on a Mac without installing Windows itself, and he explains methods of acquiring Windows, a topic made confusing by Microsoft's many licensing options and activation mechanism. …”
    Libro electrónico
  20. 21660
    Publicado 2009
    “…Nilson is a senior program manager for EDS/HP and has led many successful SAP implementation teams over the years. …”
    Libro electrónico