Home | Amazing | Today | Tags | Publishers | Years | Search 
MCSE Training Kit: Designing Microsoft Windows 2000 Network Security
MCSE Training Kit: Designing Microsoft Windows 2000 Network Security

Welcome to the MCSE Training Kit—Designing Microsoft Windows 2000 Network Security. This kit prepares you to analyze an organization's business and technical requirements and design security for a Windows 2000 network. You will learn how to design security for all aspects of Windows 2000, from authentication strategies to...

PPP Design, Implementation, and Debugging (2nd Edition)
PPP Design, Implementation, and Debugging (2nd Edition)
Extensively revised and expanded to cover the latest developments in PPP and network technology, this second edition addresses such current topics as:
  • PPP in today's telecommunications infrastructure
  • PPP and telephony
  • Optical (SONET/SDH) PPP links
  • The relationship between PPP and...
Schaum's Outline of Digital Signal Processing (Schaum's)
Schaum's Outline of Digital Signal Processing (Schaum's)

Master digital signal processing with Schaum's­­the high-performance study guide. It will help you cut down on study time, hone problem-solving skills, and achieve your personal best on exams. Students love Schaum's Outlines because they produce results. Each year, hundreds of thousands of students improve their test scores and final...

Strategic Planning for Information Systems
Strategic Planning for Information Systems
Since the second edition of this book appeared in 1996, we have seen
Information Technology (IT) become an increasingly integral component
of everyone’s working life and personal environment. IT is now
ubiquitous and enables a degree of connectivity that was difficult to
envisage even 10 years ago. The technology has
...
Easy Microsoft Money
Easy Microsoft Money
Easy Microsoft Money 2004 is the perfect book for beginners who want to learn Microsoft’s financial software through a visual, full-color approach. Topics include the Credit Center, Bill Estimator, portfolio customization, importing Quicken files, tracking your income and expenses, budgeting, managing account...
Solaris Internals: Core Kernel Architecture
Solaris Internals: Core Kernel Architecture

The definitive Sun Microsystems guide to the internals of the Solaris kernel.

This book focuses on the core kernel functions, major data structures and algorithms. Its practical approach makes it an essential resource for anyone responsible for kernel, driver or application software. Anyone doing development, debugging, maintenance,...

Artificial Intelligence: Modern Approach
Artificial Intelligence: Modern Approach
Integrates state-of-the-art AI techniques into intelligent agent designs, using examples and exercises to lead the reader from simple reactive agents to full knowledge-based agents with natural language capabilities. Covers areas that are sometimes under-emphasized--reasoning under uncertainty, learning, natural language, vision and robotics--and...
A History of Modern Computing, 2nd Edition
A History of Modern Computing, 2nd Edition
Computers were invented to ‘‘compute’’: to solve ‘‘complex mathematical problems,’’ as the dictionary still defines that word. They still do that, but that is not why we are living in an ‘‘Information Age.’’ That reflects other things that computers do: store and retrieve data,...
Extreme Programming Applied: Playing to Win
Extreme Programming Applied: Playing to Win

Extreme Programming (XP) is a significant departure from traditional software development methods, one that is ushering in a change for both developers and business people. It is an agile methodology, which enables highly productive teams to produce quality software from rapidly changing or unclear requirements. XP is disciplined software...

Common Warehouse Metamodel Developer's Guide
Common Warehouse Metamodel Developer's Guide
The official guide on how to develop interoperable data warehouse and business intelligence applications from the authors of the CWM specification

This authoritative guide will show you how to develop interoperable data warehouse and business intelligence applications using the Common Warehouse Metamodel (CWM) specification. It provides you...

Protected Mode Software Architecture (PC System Architecture Series)
Protected Mode Software Architecture (PC System Architecture Series)

Protected Mode Software Architecture helps readers understandthe problems that single-task and multitasking operating systems must dealwith, and then examines each component of both the real and protected modesoftware architectures. This book is organized into three parts. Part One:Background introduces the reader to the problems faced...

Beginning Relational Data Modeling, Second Edition
Beginning Relational Data Modeling, Second Edition

Data storage design, and awareness of how data needs to be utilized within an organization, is of prime importance in ensuring that company data systems work efficiently. If you need to know how to capture the information needs of a business system in a relational database model, but don’t know where to start, then this is the book for...

Result Page: 2264 2263 2262 2261 2260 2259 2258 2257 2256 2255 2254 2253 2252 2251 2250 2249 2248 2247 2246 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy