|
|
|
|
|
Configuring Exchange 2000 ServerC.A. Murff MCSE, MCT, CTT, CNA Who should read this book? Anyone looking for clear, relevant answers on how to best utilize their existing Exchange 2000 environment.
Configuring Exchange Server 2000 is an intermediate to advanced book for both administrators and developers who are actively using... | | Software Fortresses: Modeling Enterprise ArchitecturesThis book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed... | | Guide to RISC Processors: for Programmers and EngineersPopular processor designs can be broadly divided into two categories: Complex Instruction Set Computers (CISC) and Reduced Instruction Set Computers (RISC). The dominant processor in the PC market, Pentium, belongs to the CISC category. However, the recent trend is to use the RISC designs. Even Intel has moved from CISC to RISC... |
|
|
|
|
Result Page: 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 |