Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Conformal Array Antenna Theory and Design (IEEE Press Series on Electromagnetic Wave Theory)
Conformal Array Antenna Theory and Design (IEEE Press Series on Electromagnetic Wave Theory)

This publication is the first comprehensive treatment of conformal antenna arrays from an engineering perspective. There are journal and conference papers that treat the field of conformal antenna arrays, but they are typically theoretical in nature. While providing a thorough foundation in theory, the authors of this publication provide readers...

Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
Critical Reflections on Information Systems: A Systemic Approach
Critical Reflections on Information Systems: A Systemic Approach
While implementing IS and IT in support of their business strategies, companies are looking for ways to bridge the gap between their competitive position and technological investment, including ways to use this investment to the advantage of the organization. Critical Reflections on Information Systems: A Systemic Approach faces this challenge by...
Pro SQL Server 2008 Administration
Pro SQL Server 2008 Administration

Pro SQL Server 2008 Administration is critical for database administrators seeking in-depth knowledge on administering SQL Server 2008. This book covers the impact of the new features available in SQL Server 2008 specifically targeted for database administrators, along with the tried-and-true advanced techniques required to support and...

Deploying and Troubleshooting Cisco Wireless LAN Controllers
Deploying and Troubleshooting Cisco Wireless LAN Controllers

This is the only complete, all-in-one guide to deploying, running, and troubleshooting wireless networks with Cisco® Wireless LAN Controllers (WLCs) and Lightweight Access Point Protocol (LWAPP)/Control and Provisioning of Wireless Access Points (CAPWAP). Authored by two of the most experienced Cisco wireless support...

Mac OS X System Administration
Mac OS X System Administration

Build and manage a powerful network on Mac OS X Server

Boost productivity and foster collaboration using the powerful networking tools available in Mac OS X Snow Leopard Server. With clear, detailed explanations and step-by-step instructions, Mac OS X System Administration shows you how to plan, construct, and manage a...

Drush User's Guide
Drush User's Guide

Drush is a command line interface for Drupal. Most of the tasks for building and maintaining a website are repetitive and involve filling in forms on administration pages. The majority of these tasks can be achieved with a single Drush command, drastically shortening the development and maintenance time of a project.

Drupal...

Handbook of Anticancer Pharmacokinetics and Pharmacodynamics (Cancer Drug Discovery and Development)
Handbook of Anticancer Pharmacokinetics and Pharmacodynamics (Cancer Drug Discovery and Development)

There are many steps on the road from discovery of an anticancer drug to securing its final approval by the Food and Drug Administration. In this thoroughly updated and expanded second edition of the Handbook of Anticancer Pharmacokinetics and Pharmacodynamics, leading investigators synthesize an invaluable overview of the experimental...

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

Windows 2000 Performance Guide
Windows 2000 Performance Guide
The load your users place on your Windows 2000 servers may increase approximately linearly over time, but that's no guarantee that the servers' performance will degrade smoothly and predictably. Rather--and this is the crux of Windows 2000 Performance Guide--a modest increase in workload can often cause a significant, even catastrophic,...
The Handbook of Mobile Middleware
The Handbook of Mobile Middleware

The Handbook of Mobile Middleware provides an exhaustive overview of recent developments in the various fields related to how software supports mobile computing. This advanced reference authored by internationally recognized experts integrates the valuable insight gained from actual deployments into a full compendium. It begins by presenting...

unlimited object storage image
Result Page: 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy