Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Teatro español 2,723
- Historia 2,277
- Història 930
- History 797
- Comedia española 595
- Biblia 592
- Management 569
- Filosofía 566
- Development 508
- Engineering & Applied Sciences 490
- Economic conditions 474
- Crítica e interpretación 459
- Congressos 442
- Óperas 442
- Politics and government 395
- Application software 390
- Computer networks 365
- Iglesia Católica 360
- Economic policy 331
- Business & Economics 328
- Computer Science 316
- Education 310
- Research & information: general 310
- Derecho 300
- Technology: general issues 296
- Security measures 295
- Economics 290
- Zarzuelas 283
- Research 282
- Zarzuela española 282
-
69241Publicado 2007“…Geetesh Bajaj is a Microsoft PowerPoint MVP (Most Valuable Professional) who runs the Web’s foremost PowerPoint site at www.indezine.com. He is also author of another best-selling PowerPoint book. …”
Libro electrónico -
69242Publicado 2008“…Coverage includes Overcoming the three leading causes of project failure: lack of user input, incomplete requirements and specifications, and poorly managed change Understanding each type of software requirement–how they interrelate, and what makes a good requirement Establishing a Requirements Management Plan that describes how requirements are created and handled throughout the project lifecycle Developing a Vision document that can drive your project from beginning to end Creating high-quality use cases Using requirements as the basis for system design Leveraging RequisitePro features for improved project management Integrating requirements management with the IBM Rational Unified Process® Foreword xvii Preface xix Acknowledgments xxiii About the Author xxv Part I: Overview 1 Chapter 1: Requirements Management 3 Chapter 2: Overview of RequisitePro 23 Part II: Requirements Management Activities 33 Chapter 3: Establishing a Requirements Management Plan 35 Chapter 4: Setting up the Project 45 Chapter 5: Requirements Elicitation 63 Chapter 6: Developing a Vision Document 99 Chapter 7: Creating Use Cases 129 Chapter 8: Supplementary Specification 157 Chapter 9: Creating Test Cases from Use Cases 191 Chapter 10: Creating Test Cases from Supplementary Requirements 221 Chapter 11: Object-Oriente..…”
Libro electrónico -
69243Publicado 2008“…Covers powerful DB2 9 enhancements ranging from automated management to improved compression Covers the full spectrum of DBA responsibilities, including server management, data placement, XML concepts, activity analysis, high availability, and security Presents expert tips and best practices from the DB2 customer support organization…”
Libro electrónico -
69244por Carter, Earl“…Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. …”
Publicado 2004
Libro electrónico -
69245Publicado 2008Materias:Libro electrónico
-
69246por Bejtlich, RichardTabla de Contenidos: “…-- Making Decisions with Sguil -- Sguil versus the Reference Intrusion Model -- Conclusion -- PART III: NETWORK SECURITY MONITORING PROCESSES -- Chapter 11 Best Practices -- Assessment -- Protection -- Detection -- Response -- Back to Assessment -- Conclusion -- Chapter 12 Case Studies for Managers -- Introduction to Hawke Helicopter Supplies -- Case Study 1: Emergency Network Security Monitoring -- Case Study 2: Evaluating Managed Security Monitoring Providers -- Case Study 3: Deploying an In-House NSM Solution -- Conclusion -- PART IV: NETWORK SECURITY MONITORING PEOPLE -- Chapter 13 Analyst Training Program -- Weapons and Tactics -- Telecommunications -- System Administration -- Scripting and Programming -- Management and Policy -- Training in Action -- Periodicals and Web Sites -- Case Study: Staying Current with Tools -- Conclusion -- Chapter 14 Discovering DNS -- Normal Port 53 Traffic -- Suspicious Port 53 Traffic -- Malicious Port 53 Traffic -- Conclusion -- Chapter 15 Harnessing the Power of Session Data -- The Session Scenario -- Session Data from the Wireless Segment -- Session Data from the DMZ Segment -- Session Data from the VLANs -- Session Data from the External Segment -- Conclusion -- Chapter 16 Packet Monkey Heaven -- Truncated TCP Options -- SCAN FIN -- Chained Covert Channels -- Conclusion -- PART V: THE INTRUDER VERSUS NETWORK SECURITY MONITORING -- Chapter 17 Tools for Attacking Network Security Monitoring -- Packit -- IP Sorcery -- Fragroute -- LFT -- Xprobe2 -- Cisco IOS Denial of Service -- Solaris Sadmin Exploitation Attempt -- Microsoft RPC Exploitation -- Conclusion…”
Publicado 2005
Libro electrónico -
69247por Alexandrescu, Andrei“…Recurring issues that C++ developers face in their day-to-day activity are discussed in depth and implemented in a generic way. …”
Publicado 2001
Libro electrónico -
69248Publicado 2008“…The authors approach each subject with practical advice and present best practices, tips, and tricks for solving problems. Throughout, you’ll find detailed explanations, solutions for the “pain points” of WCF development, and an extensive collection of reusable code examples. …”
Libro electrónico -
69249Publicado 1997“…The initial release includes a bridge for Microsoft's ActiveX/COM; future releases will include bridges for Netscape's LiveConnect and IBM's OpenDoc. …”
Libro electrónico -
69250Publicado 2007“…Plan your implementation and migration to Exchange 2007 Confirm that your architecture of Exchange 2007 meets best practices Build a lab environment to test that your migration, implementation, and support processes are valid Implement Cluster Continuous Replication for effective disaster recovery of a failed Exchange server or site Integrate Exchange 2007 Unified Messaging into an existing telephony environment Optimize Exchange 2007 for a scalable enterprise environment Administer and support Exchange on an ongoing basis Introduction Part I Microsoft Exchange Server 2007 Overview 1 Exchange Server 2007 Technology Primer 2 Best Practices at Planning, Prototyping, Migrating, and Deploying Exchange Server 2007 Part II Planning and Designing an Exchange Server 2007 Environment 3 Understanding Core Exchange Server 2007 Design Plans 4 Architecting an Enterprise-Level Exchange Environment 5 Integrating Exchange Server 2007 in a Non-Windows Environment 6 Understanding Network Services and Active Directory Domain Controller Placement for Exchange Server 2007 Part III Implementing Exchange Server 2007 Services 7 Installing Exchange Server 2007 8 Implementing Edge Services for an Exchange Server 2007 Environment 9 Using the Windows PowerShell in an Exchange Server 2007 Environment Part IV Securing an Exchange Server 2007 Environment 10 Client-Level Secured Messaging 11 Server and Transport-Level Security 12 Encrypting Email Communications with Exchange Server 2007 13 Securing Exchange Server 2007 with ISA Server 14 Understanding Enterprise Policy Enforcement Security Part V Migrations and Coexistence with Exchange Server 2007 15 Migrating from Windows 2000 Server to Windows Server 2003 16 Migrating to Exchange Server 2007 17 Implementing Client Access and Hub Transport Servers 18 Administering ..…”
Libro electrónico -
69251Publicado 2003“…IP Addressing Fundamentals unravels the mysteries of subnetting, supernetting, and CIDR; thoroughly explains the binary mathematics of IPv4's addressing space; and demonstrates how an IP address becomes an active component in both networks and internetworks. …”
Libro electrónico -
69252por Breakenridge, Deirdre“…Praise for PR 2.0 “An ‘easy read’ filled with practical examples of how marketing professionals can leverage these new tools to enhance PR activities. The ‘Interviews with the Experts’ sections were especially useful in helping to highlight how companies have benefited from PR2.0 .” …”
Publicado 2008
Libro electrónico -
69253Publicado 2008“…Steve works with enterprise customers in the Midwestern United States to help them plan their data center architectures. He has been an active member of the internetworking community since 1991 and has held multiple certifications from Novell, Microsoft, and Cisco. …”
Libro electrónico -
69254Publicado 2013“…But it’s never too late to envision an entirely different future—or to actively upgrade your life. It’s not about finding more time, money, or resources. …”
Libro electrónico -
69255por Kosev, Gorgi“…Understand the concepts of collective code review using Gerrit through a set of simple examples Integrate code review functionality into Continuous Integration with Jenkins Experiment with the code review lifecycle in real-life scenarios In Detail Developing software is now more than ever before a globally distributed activity: agile methodologies that worked well enough with co-located teams now need to be empowered with additional tools such as Gerrit code review to allow the developers to share, discuss, and cooperate in a more social way, even with GitHub. …”
Publicado 2013
Libro electrónico -
69256por Kroijer, Lars“…Having grown from a small and mainly US investment activity to become a global trillion-dollar circus, the hedge fund industry is often unfairly portrayed as a fee-charging gambling den. …”
Publicado 2010
Libro electrónico -
69257Publicado 2013“…IPT can perform almost any activity within ISPF, or internally invoke the function that can perform the task. …”
Libro electrónico -
69258por Wolenik, Marc J.“…Compare on-premise and cloud versions of Dynamics CRM, make your best choice, and deploy painlessly Use the advanced configuration and customization options that offer you the most value Take full advantage of Dynamics CRM’s new flow interface and productivity shortcuts Learn about new add-on features for Dynamics, including MarketingPilot, NetBreeze, and Yammer Personalize dashboards, activities, calendars, data import/export, and more Manage leads, opportunities, accounts, contacts, marketing lists, collateral, campaigns, quotes, orders, and invoices Integrate schedules, cases, contacts, and product/service information Build powerful automated workflows, processes, and complete solutions Deliver CRM applications to smartphones and tablets, including iOS devices Provide watch lists, automatic alerts, and other sales help through InsideView Social Insights Extend Dynamics CRM with custom plug-ins and add-ons Integrate Dynamics CRM 2013 with SharePoint, Azure, SQL Server, SRSS, Visual Studio, and .NET Framework ON THE WEB: Download all examples and source code prese..…”
Publicado 2014
Libro electrónico -
69259por Geier, James T.Tabla de Contenidos: “…Chapter 9 Defining Requirements for a Wireless LAN -- Requirements Attributes -- Requirements Definition Steps -- Step 1: Gathering Information -- Step 2: Analyzing Requirements -- Step 3: Documenting Requirements -- Step 4: Obtaining Requirements Approval -- Chapter 10 System Architecture Considerations -- Architectural Considerations -- Wireless Access Networks -- Distribution Systems -- Voice over WLAN Systems -- Application Connectivity -- Chapter 11 Range, Performance, and Roaming Considerations -- Range Versus Performance -- Range Considerations -- Performance Considerations -- Roaming Considerations -- Chapter 12 Radio Frequency Considerations -- Frequency Band Selection -- Transmission Channel Settings -- Difficult-to-Cover Areas -- Radio Signal Interference Reduction -- Chapter 13 Security Considerations -- Security Elements -- Encryption -- Authentication -- Rogue Access Point Detection -- RF Shielding -- Wireless Security Polices -- Part IV: Wireless Network Installation and Testing -- Chapter 14 Test Tools -- Tool Considerations -- Spectrum Analyzers -- Signal Coverage Testers -- Wireless Protocol Analyzers -- Chapter 15 Performing a Wireless Site Survey -- Wireless Site Survey Considerations -- Reviewing Requirements -- Selecting Site Survey Tools -- Obtaining Floor Diagrams -- Inspecting the Facility -- Assessing the Existing Network Infrastructure -- Identifying Potential Radio Signal Interference -- Defining Signal Values for Acceptable Signal Coverage -- Identifying Optimum Access Point Antenna Installation Locations -- Writing an RF Site Survey Report -- Chapter 16 Installing and Configuring a Wireless LAN -- Wireless LAN Installation Considerations -- Planning the Installation -- Staging the Components -- Installing Ethernet Switches and Cabling -- Installing Access Points -- Testing the Installation -- Documenting the Installation…”
Publicado 2010
Libro electrónico -
69260Publicado 2011“…Her work has been featured in Stocks & Commodities, Futures, Active Trader, Option Trader, Your Trading Edge, and Pitnews Magazine , and she has been quoted in media ranging from Reuters to Investor’s Business Daily and The Wall Street Journal . …”