|
|
|
|
Upgrading and Repairing Networks (5th Edition)Even if you aren't a networking professional, Upgrading and Repairing Networks explains those tough networking concepts in a way that won't make you reach for a bottle of aspirin, starting with the fundamentals and working through more advanced concepts. Now in its fourth edition, this industry classic networking reference gives you real world,... | | WAN Survival Guide: Strategies for VPNs and Multiservice NetworksEnsure that your WAN can handle the latest technologies with this must-have strategy guide If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with the emergence of new technologies such as VPNs, multi-service networks, and... | | SAS 9.1.3 Language Reference: Dictionary, 3-Volume SetNew and enhanced features in Base SAS save you time, effort, and system resources by providing faster processing and easier data access and management, more robust analysis, and improved data presentation.
- By using new SAS system options that enable threading and the use of multiple CPUs, the following SAS procedures take
... |
|
Handbook of Data Intensive Computing
This handbook is carefully edited book – contributors are worldwide experts in
the field of data intensive computing and their applications. The scope of the
book includes leading edge data intensive computing architectures and systems,
innovative storage, virtualization, and parallel processing technologies applied in... | | Wireless Receiver Design for Digital Communications
There have been two paradigm shifts since we wrote the first edition of this book. The
first major shift is that the world is now full of digital signals. Commercial television
and radio have changed from analog to digital formats. Cellular telephone signals are
digital, and even video baby monitors transmit digital signals.... | | |
|
| | Hack Proofing Sun Solaris 8Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors... | | Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |
|
|
|
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 |