VMware Horizon 6 Desktop Virtualization Solutions
Plan, design, and secure your virtual desktop environments with VMware Horizon 6 View
About This Book
Design a successful solution to deliver Windows desktops and applications as a service
Provide redundancy for components and design a backup solution and disaster recovery plan to protect...
Git in Practice
Git in Practice is a collection of 66 tested techniques that will optimize the way you and your team manage your development projects. The book begins with a brief reminder of the core version control concepts you need when using Git and moves on to the high-value features you may not have explored...
Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...
CISA: Certified Information Systems Auditor Study Guide Take charge of your career with certification that can increase your marketability. Demand for information systems auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification and improve your job skills with the targeted training you'll receive in this valuable book.
Microsoft Exchange Server 2013 High Availability
Design a highly available Exchange 2013 messaging environment using real-world examples
Use the easy-to-follow guidelines and tips to achieve the highest availability
Covers all the aspects that need to be considered before, during and after implementation of high availability...
SAP HANA Cookbook
Your all-inclusive guide to understanding SAP HANA with practical recipes
Understand the architecture of SAP HANA, effectively transforming your business with the modeler and in-memory computing engine
Learn about Business Intelligence, Analytics, and Predictive analytics on top of...
Virtualization Security: Protecting Virtualized Environments
Securing virtual environments for VMware, Citrix, and Microsoft hypervisors
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...
Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
|Result Page: 27 26 25 24 23 22 21 20 19 18 |