Account
Orders
Advanced search
In a constant stream of new ideas, wireless technologies continue to emerge offering a range of capabilities, each affording simplicity and ease-of-use. Such diversity and choice should surely beg the question, "are manufacturers using the right technology for the...
Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs...
SharePoint provides a vital service to businesses--content sharing over Intranet and Internet sites. Microsoft is investing tons of research and development money into content sharing technologies:SharePoint is the "next big thing" for MS Office users, especially in a...
Exchange 2007 represents the biggest advance in the history of MicrosoftExchange Server technology. Given Exchange's leap to x64 architecture and its wide array of new features, it isn't surprising that the SP1 release of 2007 would be particularly robust in terms of...
Microsoft Outlook is the most widely used e-mail program and offers the most programmability. Sue Mosher introduces key concepts for programming Outlook using Visual Basic for Applications, custom Outlook forms, and external scripts, without the need for additional...
Exchange Server is necessary to support Outlook and SharePoint in the enterprise messaging at virtually all Fortune 1000 firms. Microsoft(r)Exchange Server 2003 SP1 and SP2 Deployment and Migration describes everything that you need to know about designing, planning,...
Grid architecture is Oracle's strategy for high-end computing and RAC is the stepping stone into this arena. This book focuses on current technology including all valid RAC features up through Oracle Database 10g Release 2, with a primary focus on deploying it in a...
One of the challenges of administering and supporting Microsoft® Outlook 2003 is that it stores settings in so many different places - in the Windows registry, as files in the user's profile folders, and in the information store itself. Configuring Microsoft® Outlook...
This book will meet the needs of those LINUX users who wish to set up a desktop LINUX workstations, and integrate them into their corporate environment. It will provide practical answers to such questions as: a) What tools do I use to fully integrate with the Microsoft...
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be...
This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including...
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's complex and ever changing converged network environment and it will help you secure your VoIP network whether...
The goal of this book is to present and compare various options one for systems architecture from two separate points of view. One, that of the information technology decision-maker who must choose a solution matching company business requirements, and secondly that of...
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private...
Microsoft SharePoint Technologies: Planning, Design and Implementation provides an in-depth examination of the tasks involved in planning, designing and deploying SharePoint in your enterprise. The book examines SharePoint from the user's perspective, the...
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the...
This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to...
With over 40% new and revised material throughout the book, this updated version provides thorough coverage of implementation, migration and management issues for Exchange 2000 and 2003, all backed up by best practices developed by HP, Microsoft's only world-wide Prime...
Developers and DBAs use Oracle SQL coding on a daily basis, whether for application development, finding problems, fine-tuning solutions to those problems, or other critical DBA tasks. Oracle SQL: Jumpstart with Examples is the fastest way to get started and to...
Microsoft® Exchange Server 2003 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment. The book discusses the requisite infrastructure requirements of Windows 2000 and Windows 2003....
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers