73 Results for:CD-ROM
- Sort by:
VMware ESX essentials: Virtual Machine File System
01 Dec 2008This section of our chapter excerpt on storage from the book "VMware ESX Essentials in the Virtual Data Center" explains the difference between direct- and network-attached storage and how to configure a client's ... Read More
Dell offers new Latitude to mobile users
04 Oct 2001PC maker Dell is offering a new Latitude C610 notebook PC with extended battery life of up to eight hours. Read More
Leave no trace: Understanding attackers' motives
21 Sep 2005This excerpt from Chapter 1 of "Rootkits: Subverting the Windows Kernel," explains the purpose of back doors and how hackers use them, as well as how stealth plays a major role in most successful attacks. Read More
Resolving VMware ESX problems without pulling the plug
24 Jun 2008Instead of being driven to desperation and being forced to press Restart, you can learn resolve VMware ESX problems quickly. Read More
Understanding VMware ESX virtual machine physical and virtual hardware
03 Dec 2008You can better manage virtual machines by understanding the virtual hardware that makes up a VM. This tip explores VM physical and virtual hardware issues, including configuring virtual hardware and assigning ... Read More
Defining dimensional vs. normalized database design, dimension vs. fact tables
14 Apr 2009Find out if your existing database is in dimensional style or normalized database design style, learn the benefits and drawbacks of fact-dimension and normalized database schemas and read a comparison of dimension ... Read More
Hard disk drive specifications guide: What to look for when buying disk storage
17 Aug 2009Seek times, latency, data transfer rates, error correction codes and cache are important hard disk drive specifications. Learn the key features of hard disks drives so you can specify the right one for your data ... Read More
Ten steps to a Windows Server 2003 virtual cluster configuration
04 Aug 2009Configure and test a Windows Server 2003 cluster on your desktop using virtualization technology with these ten easy steps. Read More
Security on a Shoestring: Creating Internet policies on the cheap
10 Jan 2005No matter how small the organization, it's impractical to stand over employees and make sure they properly use the Internet. So here's how to write a decent acceptable use policy, and make sure everyone abides by ... Read More
Security Bytes: George Mason U. hacked; new Trojans on the loose
10 Jan 2005Hackers steal personal data of more than 30,000 members of George Mason University. Two new Trojans emerge. BMC Software buys a Parisian company. Read More