 |
|
 IMS: A Development and Deployment PerspectiveProviding an holistic approach to IMS technologies, IMS: A Development and Deployment Perspective explores service architecture for development and delivery of IMS services. Approaching IMS from the perspective of the user and the service provider it examines both the current state of deployment and future trends. The book offers a... |  |  Networking, A Beginner's Guide, Fifth Edition (Networking Professional's Library)A practical guide to networking fundamentals
Fully up to date with the latest technologies, this introductory handbook covers wired and wireless network design, configuration, hardware, protocols, security, backup, recovery, virtualization, and more. After laying the groundwork, Networking: A Beginner's Guide, Fifth... |  |  Vulnerability ManagementAs old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any... |
|
 Microsoft Windows 7 Your Way: Speed Up and Customize WindowWant to make Windows 7 run faster, smarter, easier, better? Want to personalize Windows to look and act the way you want it to? Want to get
more efficient and ditch all those Windows hassles? You don’t need
a Ph.D in computer science or expensive upgrades. All you need is this book!
... |  |  Advanced Batteries: Materials Science AspectsEnergy is important to all of us, for a variety of reasons, but primarily because it can be useful. It can be found in a number of different forms. One readily recognizes the concepts of potential energy and kinetic energy, as well as the chemical energy in fuels, thermal energy as heat, the kinetic energy in wind and moving water, and magnetic and... |  |  Secrets of the JavaScript Ninja
There is nothing simple about creating effective, cross-browser, JavaScript code. In addition to the normal challenge of writing clean code you have the added complexity of dealing with obtuse browser complexities. To counter-act this JavaScript developers frequently construct some set of common, reusable, functionality in the form of... |
|
 |  |  97 Things Every Programmer Should Know: Collective Wisdom from the Experts
Programmers have a lot on their minds . Programming languages, programming techniques, development environments, coding style, tools, development process, deadlines, meetings, software architecture, design patterns, team dynamics, code, requirements, bugs, code quality. And more. A lot. There is an art, craft, and science to programming that... |  |  |
|
 Professional Penetration Testing: Creating and Operating a Formal Hacking LabSave yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!
Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a... |  |  2012: The Return of QuetzalcoatlThe acclaimed metaphysical epic that binds together the cosmological phenomena of our time, ranging from crop circles to quantum theory to the resurgence of psychedelic drugs, to support the contention of the Mayan calendar that the year 2012 portends a global shift-in consciousness, culture, and way of living-of unprecedented... |  |  The Rhetorical Nature of XML: Constructing Knowledge in Networked EnvironmentsThe Rhetorical Nature of XML is the first volume to combine rhetoric, XML, and knowledge management in a substantive manner. It serves as a primer on XML and XML-related technologies, illustrating how the naming of XML elements can be understood as a rhetorical act, and detailing the essentials of knowledge management practices that... |
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |