Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Business Intelligence with Microsoft® Office PerformancePoint Server 2007
Business Intelligence with Microsoft® Office PerformancePoint Server 2007
An in-depth guide to creating world-class Business Intelligence solutions

This comprehensive volume covers every aspect of PerformancePoint 2007, the latest in Microsoft's line of Business Intelligence applications. You will learn to collect and warehouse corporate data, perform fiscal analysis, distribute dynamic...

Signal Processing for Wireless Communications
Signal Processing for Wireless Communications
Master the Signal Processing Concepts and Techniques Needed to Design and Operate Any Wireless Communications Network

Signal Processing for Wireless Communications offers communications engineers an application-focused guide to the essential concepts and techniques of wireless signal processing. This comprehensive...

The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
There are two camps of service providers who make money off of the residential Internet users today. Camp one is made up of the Googles, Yahoos, and AOLs who are often referred to as “over the top” or WEB 2.0 service providers. This camp doesn’t need IMS, or at least they haven’t shown much interest in IMS. On the other...
Gray Hat Hacking, Second Edition
Gray Hat Hacking, Second Edition
Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...

Delivering Carrier Ethernet: Extending Ethernet Beyond the LAN
Delivering Carrier Ethernet: Extending Ethernet Beyond the LAN
Even as the value of Ethernet beyond the LAN was being widely recognized, the major challenge was the lack of clarity as to what this “Carrier Ethernet” entailed, and more generally, a lack of understanding of the delivery solutions over the diverse network infrastructures used by Service Providers. This was to a large extent...
How to Do Everything: Mac
How to Do Everything: Mac
Congratulations are in order! Chances are good that if you’ve purchased this book you either own or soon will own a Mac, and that is always a good thing. If you are using a computer for the first time, your experience will be light years beyond that of your friend or family member who started out with a PC. If you are a seasoned PC user, the...
Execution Plain and Simple: Twelve Steps to Achieving Any Goal on Time and On Budget
Execution Plain and Simple: Twelve Steps to Achieving Any Goal on Time and On Budget
Specific Steps to Accelerate Achievement of Goals and Turn Strategy Into Payoff, for Those Who Have To Execute.

Robert A. Neiman has helped major corporations achieve major gains in performance and profitability. He has put his experience on paper for managers who know their organizations have much more potential, can and must do better, and...

Mike Meyers' A+ Certification Passport, Second Edition
Mike Meyers' A+ Certification Passport, Second Edition

Get on the road to becoming A+ certified with this concise, affordable study tool. Certification training guru Mike Meyers along with Martin Acuna will guide you on your career path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the test, this Certification Passport...

Network Security: A Beginner's Guide, Second Edition
Network Security: A Beginner's Guide, Second Edition
Essential Skills--Made Easy!

Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack...

How To Do Everything with Your Tablet PC
How To Do Everything with Your Tablet PC
Explore the capabilities and benefits of your Tablet PC hardware and software with help from this easy-to-understand guide. Get a thorough run-through of your new device, as well as the Windows XP Tablet PC Edition operating system that runs on it. Once you've become familiar with the hardware and software features, follow helpful chapters that...
Crystal Reports Professional Results
Crystal Reports Professional Results
Create presentation-quality reports and complex, interactive analysis documents both on and off the Web with help from this thorough resource. Learn to use this powerful reporting tool to develop and design reports, make maps, tables, and charts, and much more. Produce visually appealing reports quickly and effectively, extract and present data...
unlimited object storage image
Result Page: 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy