 |
|
 |  |  Security MonitoringHow well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic... |  |  |
|
|
 Video Game Design Revealed (Revealed (Charles River Media))Whether you are a professional game developer working in an established studio or a creative thinker interested in trying your hand at game design, "Video Game Design Revealed" will show you the steps and processes involved in bringing a video game from concept to completion. Beginning with an overview of the... |  |  The System Designer's Guide to VHDL-AMS (Systems on Silicon)The demand is exploding for complete, integrated systems that sense, process, manipulate, and control complex entities such as sound, images, text, motion, and environmental conditions. These systems, from hand-held devices to automotive sub-systems to aerospace vehicles, employ electronics to manage and adapt to a world that is, predominantly,... |  |  Managing RAID on Linux"Finally, the book contains a good index and a brief appendix giving links to other sources. A very useful volume that should find favour with anyone who wishes to implement RAID on a Linux system." - Steve Boniwell, HP/Works
Redundant Array of Independent Disks (RAID) technology is becoming a standard feature of... |
|
|
| Result Page: 540 539 538 537 536 535 534 533 532 531 530 529 528 527 526 525 524 523 522 |