Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Advances in Research on Networked Learning (Computer-Supported Collaborative Learning Series)
Advances in Research on Networked Learning (Computer-Supported Collaborative Learning Series)

Networked learning is learning in which information and communications technology (ICT) is used to promote connections: between one learner and other learners; between learners and tutors; between a learning community and its learning resources. Networked learning is an area which has great practical and theoretical importance. It is a rapidly...

Communications Satellites: Global Change Agents (Telecommunications Series)
Communications Satellites: Global Change Agents (Telecommunications Series)

Over the past 40 years, satellites have played a key role in creating a global culture, spreading worldwide entertainment, stimulating technological interchange, and promoting trade around the world. Communications Satellites: Global Change Agents addresses communications satellites not only in terms of the technology and the services...

Computer Methods for Analysis of Mixed-Mode Switching Circuits
Computer Methods for Analysis of Mixed-Mode Switching Circuits

Mixed-mode switching circuits distinguish themselves from other circuits by including switches that are either clocked externally or controlled internally. These circuits have found broad applications in telecommunication networks, instrumentation, and power electronic systems, to name a few. It is the emergence of switched capacitor...

Vaccinia Virus and Poxvirology: Methods and Protocols (Methods in Molecular Biology)
Vaccinia Virus and Poxvirology: Methods and Protocols (Methods in Molecular Biology)

A comprehensive collection of cutting-edge methods to study and work with the vaccinia virus and other poxvirus gene transcriptions. These readily reproducible techniques can be used for the construction and characterization of recombinant viruses; for the study of poxvirus gene transcription and DNA replication; for the investigation of the...

Hibernate: A J2EE™ Developer's Guide
Hibernate: A J2EE™ Developer's Guide
Build fast, high-performance Java database applications with Hibernate.

Hibernate makes it far easier to build robust, high-performance database applications with Java. Now there's a practical, hands-on guide to using Hibernate's flexible, fast object/relational persistence and query services. Will Iverson covers every facet of...

Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
This book had its genesis in June 1996 when the Wharton Risk
Management and Decision Processes Center (Wharton Risk Center) co-hosted
a conference on “Information Technology and Its Impact on Catastrophic
Risks”. It was one of the events that year celebrating the Anniversary of
the first computer (ENIAC) at the
...
BEA WebLogic Workshop 8.1 Kick Start: Simplifying Java Web Applications and J2EE
BEA WebLogic Workshop 8.1 Kick Start: Simplifying Java Web Applications and J2EE

BEA WebLogic Workshop 8.1 Kick Start shows you how to make J2EE programming easier, providing the fastest path to productivity with BEA WebLogic Workshop 8.1. The authors show how Workshop leverages the power of BEA WebLogic Platform 8.1, including WebLogic Server, WebLogic Portal, and...

Advances in Mobile Radio Access Networks
Advances in Mobile Radio Access Networks
This book gives a comprehensive overview of the technologies for the advances of
mobile radio access networks. The topics covered include linear transmitters,
superconducting filters and cryogenic radio frequency (RF) front head, radio over
fiber, software radio base stations, mobile terminal positioning, high speed
downlink
...
Categories for Software Engineering
Categories for Software Engineering

This book provides a gentle, software engineering oriented introduction to category theory. Assuming only a minimum of mathematical preparation, this book explores the use of categorical constructions from the point of view of the methods and techniques that have been proposed for the engineering of complex software systems: object-oriented...

Molecular Markers of Brain Tumor Cells: Implications for Diagnosis, Prognosis and Anti-Neoplastic Biological Therapy
Molecular Markers of Brain Tumor Cells: Implications for Diagnosis, Prognosis and Anti-Neoplastic Biological Therapy

Childhood brain tumors are a diverse group of diseases characterized by the abnormal growth of tissue contained within the skull. Other than leukemia and lymphoma, brain tumors are the most common type of neoplasms that occur in children. The leading cause of death from childhood neoplasms among persons up to 19 years is brain tumors. As...

unlimited object storage image
Result Page: Previous 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy