Navigation bar
  Start Previous page
 24 of 106 
Next page End 19 20 21 22 23 24 25 26 27 28 29  

— Using remote copy and replication to keep data synchronized and support
immediate failover to hot sites
— Leveraging core computer security concepts and strategies to protect your most
critical data
— Securing your entire storage infrastructure, not just servers
— Using policy-driven data protection and Data Lifecycle Management (DLM) to
improve security and reduce cost
— Using ILM to identify your highest-value data and choose the right ways to
protect it
— Data Protection and Information Lifecycle Management is an indispensable
resource for IT executives who must plan and implement strategies for data
protection; administrators who must protect data on a day-to-day basis; and
product managers, consultants, and marketers responsible for crafting superior
data-security solutions.
Password: www.AvaxHome.ru
_
Peter Hipson, "Firefox and Thunderbird: Beyond Browsing and Email"
Que | ISBN 0789734583 | November 1, 2005 Year | CHM | 11,13 Mb | 360 Pages
“ There's a new browser in town: Firefox is quickly becoming a leading
alternative to Microsoft Internet Explorer. If you are new to Firefox and want
to see what all the buzz is about, Firefox and Thunderbird: Beyond Browsing and
Email is the guide that you need. By focusing on how to configure and customize
Firefox and Thunderbird, this book will show you how to quickly get a hold of
the less intuitive features that most new users struggle to figure out. You will
discover which of Firefox's many options should be adjusted, which shouldn't,
and how to locate many hidden preferences that will ultimately create a better
browsing experience. The author's tips and tricks will teach you how to adjust
the browser's appearance and behavior, and how to install the most popular
extensions to maximize the browser's performance.
You'll also be introduced to Firefox's e-mail client companion, Thunderbird.
You'll cover Thunderbird's built-in spam filters, calendar, and customizeable
layout and toolbars. Personalize your e-mail with tips and tricks dedicated to
getting the most out of Thunderbird, and learn how to make it work together with
Firefox for a seamless online experience.
You can even find out how to contribute to the development of Firefox and
Thunderbird. A special section on Web development will show you how you can add
new extensions, themes, and customizations to each one and make an impact on the
future of Firefox and Thunderbird.
Password: www.AvaxHome.ru
_
Bernd Jahne, "Digital Image Processing" (5th edition)
Springer | ISBN 3540677542 | 2001 Year | DjVu | 7,59 Mb | 585 Pages
“ This book offers an integral view of image processing from image acquisition
to the extraction of the data of interest. The discussion of the general
concepts is supplemented with examples from applications on PC-based image
processing systems and ready-to-use implementations of important algorithms. The
fifth edition has been completely revised and extended. The most notable
extensions include a detailed discussion on random variables and fields, 3-D
imaging techniques and a unified approach to regularized parameter estimation.
The complete.text of the book is now available on the accompanying CD-ROM. It is
hyperlinked so that it can be used in a very flexible way. The CD-ROM contains a
full set of exercises to all topics covered by this book and a runtime version
of the image processing software heurisko. A large collection of images, image
sequences, and volumetric images is available for practical exercises.
Password: www.AvaxHome.ru
_
Ted Husted, et al - "Struts in Action: Building Web Applications with the
Leading Java Framework"
Manning Publications | ISBN 1930110502 | 2002 Year | PDF | 2,26 Mb | 664 Pages
“ Slashdot.org
"It doesn't just talk about how to configure and develop with Struts. It's a web
application manifesto."
JavaRanch.com
"The author's approach to making the reader a Struts expert is effective... Go
from Struts beginner to Struts expert."
Password: www.AvaxHome.ru
_
Howard M. Lewis Ship, "Tapestry in Action"
Manning Publications | ISBN 1932394117 | 2004 Year | PDF | 7,25 Mb | 554 Pages
“ Dr. Dobb’s Journal:
"An essential book to have... definitely worth the investment."
Javalobby.org:
"A great book about how to change the way you develop web applications."
Password: www.AvaxHome.ru
_
John Arthorne, Chris Laffra, "Official Eclipse 3.0 FAQs"
Addison-Wesley Professional | ISBN 0321268385 | 2004 Year | CHM | 2,47 Mb | 432
Pages
“ "I had a question about how to use a new Eclipse 3.0 feature, job scheduling,
so I thought I would try out this book. I immediately found the answer with a
concise explanation. Cool!"
-Erich Gamma
Official Eclipse 3.0 FAQs is the convenient source for answers to your most
crucial questions about writing Eclipse plug-ins. Whether you're creating simple
extensions for personal use or commercial Eclipse-based applications, you'll
find hundreds of concise solutions here--including many that aren't answered
anywhere else.
John Arthorne and Chris Laffra have worked with Eclipse technology since the
very beginning; both are active members of the Eclipse development community and
frequently answer questions on Eclipse newsgroups and mailing lists. Here, they
cover an extraordinary range of topics, from workspace management to
documentation, SWT to JFace, JDT to natural language support. Many FAQs include
code samples and references to other information, making the book an invaluable
desk reference for anyone working with Eclipse.
Just a few of the 350+ questions answered here...
Password: www.AvaxHome.ru
_
Omar Santos, Jazib Frahim, "Cisco ASA: All-in-One Firewall, IPS, and VPN
Adaptive Security Appliance"
Cisco Press | ISBN 1587052091 | October 14, 2005 Year | CHM | 21,45 Mb | 840
Pages
“ Identify, mitigate, and respond to network attacks
— Understand the evolution of security technologies that make up the unified ASA
device and how to install the ASA hardware
— Examine firewall solutions including network access control, IP routing, AAA,
application inspection, virtual firewalls, transparent (Layer 2) firewalls,
failover and redundancy, and QoS
— Evaluate Intrusion Prevention System (IPS) solutions including IPS integration
and Adaptive Inspection and Prevention Security Services Module (AIP-SSM)
configuration
— Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs,
and Public Key Infrastructure (PKI)
— Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device
Manager (ASDM)
Achieving maximum network security is a challenge for most organizations. Cisco®
ASA, a new unified security device that combines firewall, network antivirus,
intrusion prevention, and virtual private network (VPN) capabilities, provides
proactive threat defense that stops attacks before they spread through the
network.
This new family of adaptive security appliances also controls network activity
and application traffic and delivers flexible VPN connectivity. The result is a
powerful multifunction network security device that provides the security
breadth and depth for protecting your entire network, while reducing the high
deployment and operations costs and complexities associated with managing
multiple point products.
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a
practitioner’s guide to planning, deploying, and troubleshooting a comprehensive
security plan with Cisco ASA. The book provides valuable insight and deployment
examples and demonstrates how adaptive identification and mitigation services on
Cisco ASA provide a sophisticated security solution for both large and small
network environments.
The book contains many useful sample configurations, proven design scenarios,
and discussions of debugs that help you understand how to get the most out of
Cisco ASA in your own network.
“I have found this book really highlights the practical aspects needed for
building real-world security. It offers the insider’s guidance needed to plan,
implement, configure, and troubleshoot the Cisco ASA in customer environments
and demonstrates the potential and power of Self-Defending Networks.”
–Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems®
This security book is part of the Cisco Press® Networking Technology Series.
Security titles from Cisco Press help networking professionals secure critical
data and resources, prevent and mitigate network attacks, and build end-to-end
self-defending networks.
Password: www.AvaxHome.ru
_
Previous page Top Next page