Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Windows 2000 Scripting Guide
Microsoft Windows 2000 Scripting Guide

Welcome to the Microsoft® Windows® 2000 Scripting Guide.

As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a...

Leveraging WMI Scripting (HP Technologies)
Leveraging WMI Scripting (HP Technologies)

Leveraging Scripting is the second in a series of two books dedicated to WMI. Understanding WMI, Lissoir’s first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed...

Professional Crystal Reports for Visual Studio .NET, 2nd Edition
Professional Crystal Reports for Visual Studio .NET, 2nd Edition
The addition of Crystal Reports 9.0 to Visual Studio .NET 2003 offers developers a reporting tool that allows you to turn almost any data into interactive, dynamic content through portals, wireless devices, and Microsoft Office documents. This code-intensive guide takes you step by step through developing reports and incorporating them into...
Analysis and Control of Boolean Networks: A Semi-tensor Product Approach
Analysis and Control of Boolean Networks: A Semi-tensor Product Approach

Analysis and Control of Boolean Networks presents a systematic new approach to the investigation of Boolean control networks. The fundamental tool in this approach is a novel matrix product called the semi-tensor product (STP). Using the STP, a logical function can be expressed as a conventional discrete-time linear system. In the light of...

Security 2020: Reduce Security Risks This Decade
Security 2020: Reduce Security Risks This Decade

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT...

Fractional Dynamics: Recent Advances
Fractional Dynamics: Recent Advances

This volume provides the latest developments in the field of fractional dynamics, which covers fractional (anomalous) transport phenomena, fractional statistical mechanics, fractional quantum mechanics and fractional quantum field theory. The contributors are selected based on their active and important contributions to their respective...

Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)
Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)

Based on the author’s introductory course at the University of Oregon, Explorations in Computing: An Introduction to Computer Science focuses on the fundamental idea of computation and offers insight into how computation is used to solve a variety of interesting and important real-world problems. Taking an...

Professional Team Foundation Server
Professional Team Foundation Server

This book is for project managers, IT administrators, and anyone whose role consists of administering Team Foundation Server on a daily basis, running a software project, setting up users, or handling security.

Wrox Professional guides are planned and written by working programmers to meet the real-world needs of...

Software Testing and Analysis: Process, Principles and Techniques
Software Testing and Analysis: Process, Principles and Techniques
The first comprehensive book on software test and analysis

You can't “test quality into” a software product, but neither can you build a quality software product without test and analysis.  Software test and analysis is increasingly recognized, in research and in industrial practice, as a core challenge in...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Configuring Windows 2000 Without Active Directory
Configuring Windows 2000 Without Active Directory
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
Active and Programmable Networks for Adaptive Architectures and Services
Active and Programmable Networks for Adaptive Architectures and Services
New applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,...
unlimited object storage image
Result Page: 121 120 119 118 117 116 115 114 113 112 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy