|
|
|
|
Network+ Exam Prep 2 (Exam Prep N10-003)Attention Network+ Candidates: Stop spending valuable study time sorting through confusing study aids. Network + Exam Prep 2 is the ultimate self-study guide for the Network + exam. Featuring exercises, self-assessments, study strategies, exam tips and notes, this comprehensive guide will help you understand the concepts behind... | | Instructional Engineering in Networked Environments (Tech Training Series)A Dynamic, Research-Based Approach to Knowledge Management
In this book, Gilbert Paquette–an internationally recognized expert in the field of technology-based training–offers IT professionals, trainers, and consultants a revolutionary method for going beyond simple information management. Instructional Engineering in Networked... | | AdvancED ActionScript Components: Mastering the Flash Component ArchitectureMacromedia's architecture is like a chest filled with precious jewels, and this book is quite simply the key to open it! One of the most important tools provided with Flash is the Macromedia Component Architecture: a framework of components written in ActionScript 2, based on established design patterns, that provides a wealth of functionality you... |
|
Handbook of Research on Mobile MultimediaThe demand for mobile access to data no matter where the data is stored and where the user happens to be, in addition to the explosive growth of the Internet and the rising popularity of mobile devices, are among the factors that have created a dynamic business environment, where companies are competing to provide customers access to information... | | | | Chemical Process Safety: Learning from Case Histories"Given his extensive background in an industrial setting as a team leader at the PPG Chlor-Alkali Plant in Louisiana and the safety course that he taught for AIChE with the well-known safety expert Trevor Kletz, the quantity of information of a practical nature contained in this book is not surprising." - Gary Bennett,... |
|
Principles of Data Mining (Adaptive Computation and Machine Learning)
The growing interest in data mining is motivated by a common problem across disciplines: how does one store, access, model, and ultimately describe and understand very large data sets? Historically, different aspects of data mining have been addressed independently by different disciplines. This is the first truly... | | Adobe Flex 2: Training from the SourcePart of the Adobe Training from the Source series, the official curriculum from Adobe, developed by experienced trainers. Using project-based tutorials, this book/CD volume is designed to teach the techniques needed to create sophisticated, professional-level projects. Each book includes a CD that contains all the files used in the lessons, plus... | | Hardening Linux"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as... |
|
| | Perfect Passwords: Selection, Protection, AuthenticationUser passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According... | | .Mac with iWeb, Second Edition (Visual QuickStart Guide)Need to learn what’s new in .Mac fast? Try a Visual QuickStart! This best-selling reference’s visual format and step-by-step, task-based instructions will have you up and running with .Mac in no time. In this completely updated edition of our best-selling guide to .Mac leading software application expert... |
|
|
Result Page: 1773 1772 1771 1770 1769 1768 1767 1766 1765 1764 1763 1762 1761 1760 1759 1758 1757 1756 1755 |