 |
|
 Geographic Information Systems and ScienceGeographic Information Systems and Science has become the pre-eminent textbook in its field, for students and practitioners alike. Its unique approach communicates the richness and diversity of GIS in a lucid and accessible format. This fully revised and updated second edition reinforces the view of GIS as a gateway to science and... |  |  |  |  Encyclopedia of Twentieth-Century Photography (3 Volumes)Photography is an international cultural form, practice, and profession. Encompassing art, advertising, journalism, fashion, commercial, political, and everyday photography, the field of photography also includes chemical processes, mechanical inventions, equipment, industries, movements, techniques, terms and concepts. In addition, photography has... |
|
 Windows Server 2008 BibleMoving to Windows Server 2008? Start with this book.
Windows Server 2008 has arrived with many new features and choices, and this hands-on reference shows you how to handle them all. Whether you're starting from scratch or upgrading, you'll find a wealth of information on how to install, configure, manage, and... |  |  The Best Damn Windows Server 2008 Book Period, Second EditionIn depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.
The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.
This book will show you how to... |  |  Absolute Beginner's Guide to Personal FirewallsThe Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal... |
|
|
 Critical Reflections on Information Systems: A Systemic ApproachWhile implementing IS and IT in support of their business strategies, companies are looking for ways to bridge the gap between their competitive position and technological investment, including ways to use this investment to the advantage of the organization. Critical Reflections on Information Systems: A Systemic Approach faces this challenge by... |  |  |  |  Securing & Optimizing Linux: The Hacking SolutionThis 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system... |
|
Result Page: 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 |