 |
|
 Sams Teach Yourself Red Hat Linux 8 in 24 HoursAn easy-to-understand, step-by-step guide to installing, configuring, and using Red Hat Linux. Red Hat Linux is the most popular choice among Linux users in the U.S., with about 80% of the U.S. Linux market. Includes complete coverage of the new features of the upgrade to Red Hat, due out in Fall 2002. Assumes no prior knowledge of Linux and is an... |  |  Data Mining Applications for Empowering Knowledge SocietiesData Mining techniques are gradually becoming essential components of corporate intelligence systems and progressively evolving into a pervasive technology within activities that range from the utilization of historical data to predicting the success of an awareness campaign. In reality, data mining is becoming an interdisciplinary field driven by... |  |  Making IT Count: Strategy, Delivery, Infrastructure (Computer Weekly Professional)'Making IT Count: from strategy to implementation' focuses on the practical elements of delivering Information Technology strategy. Studies regularly show that over half of Information Technology strategies are never implemented, or are unsuccessful in delivering the desired results, and that a significant percentage of strategies implemented... |
|
 Numerical Computing with Simulink, Volume I: Creating SimulationsSimulation is the preferred approach for engineers and scientists who design complex systems because it allows them to test a system design's performance standards. This book explores simulation, starting with Galileo and ending with the lunar landing. It provides an introduction to computer-aided system design with Simulink®, a robust,... |  |  Designing Successful e-Learning, Michael Allen's Online Learning Library“The theoretical literature on learning and growth can be difficult to master and even more challenging to integrate into e-learning, but Michael has made this easy for all of us. He explains this thinking in clear and accessible language, amplifies the theories with research results, and describes popular approaches by applying these... |  |  Maximum Windows 2000 Security (Maximum Security)Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.
Topics include:
Physical & File System Security,
Password Security,
Malicious Code,
Windows 2000 Network Security Architecture and Professional... |
|
 |  |  Grid Computing: The Savvy Manager's Guide (The Savvy Manager's Guides)"This book explains grid in simple terms, using practical examples to demonstrate the technical and business benefits of grid and providing hands-on guidance for readers. This is a must read for everyone who is seriously investigating grid or planning to integrate grid technology in their IT environment." --Wolfgang Gentzsch,... |  |  |
|
|
| Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |