Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 768
- Management 727
- Engineering & Applied Sciences 715
- History 674
- Application software 584
- Computer Science 481
- Historia 379
- Data processing 351
- Computer networks 348
- Leadership 300
- Business & Economics 291
- Computer software 276
- Design 276
- Economics 276
- Database management 261
- Computer programs 255
- Artificial intelligence 254
- Information technology 253
- Security measures 253
- Education 250
- Computer programming 241
- Python (Computer program language) 233
- Social aspects 232
- Cloud computing 230
- Web site development 229
- Computer security 223
- Web sites 222
- Java (Computer program language) 221
- Medicine 214
- Business 200
-
21641por Alger, Douglas“…A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company’s valuable information. …”
Publicado 2005
Libro electrónico -
21642Publicado 2007“…Coverage includes: Why conventional bug-catching often misses security problems How static analysis can help programmers get security right The critical attributes and algorithms that make or break a static analysis tool 36 techniques for making static analysis more effective on your code More than 70 types of serious security vulnerabilities, with specific solutions Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more Techniques for handling untrusted input Eliminating buffer overflows: tactical and strategic approaches Avoiding errors specific to Web applications, Web services, and Ajax Security-aware logging, debugging, and error/exception handling Creating, maintaining, and sharing secrets and confidential information Detailed tutorials that walk you through the static analysis process “We designed Java so that it could be analyzed statically. …”
Libro electrónico -
21643Publicado 2006“…A practical guide for comparing, designing, and deploying IPsec, MPLS Layer 3, L2TPv3, L2TPv2, AToM, and SSL virtual private networks Explore the major VPN technologies and their applications, design, and configurations on the Cisco IOS® Router, Cisco® ASA 5500 Series, and the Cisco VPN 3000 Series Concentrator platforms Compare the various VPN protocols and technologies, learn their advantages and disadvantages, and understand their real-world applications and methods of integration Find out how to design and implement Secure Socket Layer (SSL) VPNs, including consideration of clientless operation, the Cisco SSL VPN Client, the Cisco Secure Desktop, file and web server access, e-mail proxies, and port forwarding Learn how to deploy scalable and secure IPsec and L2TP remote access VPN designs, including consideration of authentication, encryption, split-tunneling, high availability, load-balancing, and NAT transparency Master scalable IPsec site-to-site VPN design and implementation including configuration of security protocols and policies, multiprotocol/ multicast traffic transport, NAT/PAT traversal, quality of service (QoS), Dynamic Multipoint VPNs (DMVPNs), and public key infrastructure (PKI) Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. However, with so many flavors of VPNs available, companies and providers are often hard pressed to identify, design, and deploy the VPN solutions that are most appropriate for their particular network architecture and service needs. …”
Libro electrónico -
21644Publicado 2007“…The Smart Way to StudyTM In This Book You’ll Learn How To: Understand the impact of the latest improvements in Windows ServerTM 2003 on Active Directory, including Service Pack 1 (SP1) and Release 2 (R2) Plan an Active Directory infrastructure, including forests, trees, domains, organizational units (OUs), sites, global catalogs, and operations masters Install Active Directory domain controllers in forest roots, child domains, and additional domain controllers Plan and implement trust relationships within and between Active Directory forests, Windows NT 4.0 domains, and Kerberos realms Configure Active Directory sites, including site boundaries, links, link bridges, and replications Manage, monitor, maintain, and restore the Active Directory infrastructure Plan and implement user and group strategies, including security and distribution groups, organizational unit structures, and user authentication strategies Plan the application of Group Policy to users, computers, sites, domains, and organizational units Use Group Policy to configure the user and computer environment, including software distribution and upgrade, certificate enrollment, security settings, folder redirection, and many other available policy settings Use Resultant Set of Policy (RSoP) and other tools to manage and troubleshoot Group Policy WRITTEN BY A LEADING 70-294 EXAM EXPERT! …”
Libro electrónico -
21645por Abelar, Greg“…Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a “black-box-voodoo” technology that is very sophisticated and intimidating. …”
Publicado 2005
Libro electrónico -
21646Publicado 2007“…. · Includes a chapter on troubleshooting, plus many insider tips, notes, and cautions throughout all chapters. · Shows you ho..…”
Libro electrónico -
21647Publicado 2006“…The book places an emphasis on configuring Cisco Catalyst switches with Cisco IOS® Software, with many chapters covering both Cisco IOS and Cisco CatOS. …”
Libro electrónico -
21648Publicado 2004“…Cisco Systems has continued the support and development of the PIX OS to provide networks top-notch security while maintaining compatibility with the latest standards and protocols. Now offered in many models, the PIX Firewall is perfectly suited to meet the requirements of small offices (501 model), medium to large businesses (506E, 515E, and 525 models), and large enterprise and service provider customers (525 and 535 models and the Firewall Services Module). …”
Libro electrónico -
21649Publicado 2007“…The authors cover Ubuntu 7.04 from start to finish: installation, configuration, desktop productivity, games, management, support, and much more. Among the many new topics covered in this edition: Ubuntu's expanded multimedia functionality and Edubuntu offerings geared for schools and educational settings. …”
Libro electrónico -
21650por Bott, Ed“…Ed Bott is an award-winning computer journalist and one of the most widely recognized voices in the computing world, with nearly two decades of experience as a writer and editor at leading magazines, such as PC World, PC Computing, and Smart Business. Ed has written many of Que’s all-time bestsellers, including Special Edition Using Office 2000, Special Edition Using Windows 98, and Special Edition Using Windows Me. …”
Publicado 2007
Libro electrónico -
21651por Sells, Chris“….” — Pierre Nallet , DevelopMentor Instructor “Chris does a nice job of presenting the core elements of WinForms complete with many concise samples and graphic depictions of UI features in action. …”
Publicado 2004
Libro electrónico -
21652por Sayles, Leonard R.“…Seeking unprecedented individual gains, many members of the business community forgot their commitment to personal integrity, which maintains an essential trust among strangers, which binds all members in the larger society." …”
Publicado 2006
Libro electrónico -
21653Publicado 2005“…Synthetic Strategies including Collar, Synthetic Call, Synthetic Put, Synthetic Straddles, Synthetic Futures, Combos, Box Spread... ...and many more strategies... Plus essential tax-saving information, and more! …”
Libro electrónico -
21654por Harold, Elliotte Rusty“…In addition, the book covers many useful supplements to these core APIs, including XPath, XSLT, TrAX, and JAXP. …”
Publicado 2003
Libro electrónico -
21655Publicado 2008“…In his eight years with Ascolta, Brandon has developed and taught many private Cisco cour..…”
Libro electrónico -
21656Publicado 2009“…—Michael Peachey, co-founder of General Interface and Director of User Experience, TIBCO Software Anil Gurnani has written extensively on technical topics for many prestigious magazines. He is an adjunct at SCPS, New York University, where he teaches advanced courses focused on web and enterprise technologies including Core Java, JEE, and .NET. …”
Libro electrónico -
21657Publicado 2009“…Best of all, George presents many of his own creative trading methods including his Natural Number Method, explained for the first time in this book.”…”
Libro electrónico -
21658por Augen, Jeffrey“…You’ll master trades designed to profit from rising or falling stock prices, rising or falling volatility, time decay, rapid price spikes, and many other market dynamics. Each section helps you build your skills one trade at a time---whether you’re new to options or you’ve been trading for years. …”
Publicado 2009
Libro electrónico -
21659Publicado 2009“…Kissell also looks at software that makes it possible to run Windows programs on a Mac without installing Windows itself, and he explains methods of acquiring Windows, a topic made confusing by Microsoft's many licensing options and activation mechanism. …”
Libro electrónico -
21660Publicado 2009“…Nilson is a senior program manager for EDS/HP and has led many successful SAP implementation teams over the years. …”
Libro electrónico