Home | Amazing | Today | Tags | Publishers | Years | Search 
How the Internet Works (8th Edition)
How the Internet Works (8th Edition)
Have you ever wanted to know how data travels from computer to computer, around the world? Have you ever wondered how Web sites can track users or how newsgroups work? How the Internet Works shows you how with easy-to-follow, four-color visual spreads tracking the path data flows and the hardware involved. Now entering its fourth year, How the...
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9.

The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed...

Apple I Replica Creation: Back to the Garage
Apple I Replica Creation: Back to the Garage
The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design. The book will begin by teaching readers the basics of computer processing by...
Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange
Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange
With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption is nothing new to Windows, recent advances in Microsoft® Windows 2003 and Microsoft® Windows XP have drastically simplified the support of encryption technologies in Windows...
Fundraising on eBay
Fundraising on eBay
Connect with millions of new donors instantly

Looking for a new, fun, and effective way to raise funds? Now you can use the world’s largest online marketplace to raise both cash and awareness for your nonprofit or charitable cause with help from this invaluable how-to guide. Fundraising on eBay is filled with proven tips for...

Security+Fast Pass
Security+Fast Pass

The Perfect Preparation and Review Resource

Security+ Fast Pass is the streamlined tool you need to bone up for the Security+ exam [SYO-101]. The enclosed CD lets you practice, practice, practice, and you’ll keep the book—packed with concise, objective-focused coverage and
...

How to Cheat at Administering Office Communications Server 2007
How to Cheat at Administering Office Communications Server 2007
Microsoft Office Communications Server (OCS) 2007 is Microsofts latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP (VoIP), and audio conferencing and videoconferencing. It will work with your companys...
RibbonX: Customizing the Office 2007 Ribbon
RibbonX: Customizing the Office 2007 Ribbon
Microsoft MVPs teach you new skills for customizing the Ribbon

If you like to build custom applications or customize the Office user interface, this book is for you. Written by a team of Microsoft MVPs, it shows you—step by step—how easy it is to modify the Microsoft Office® 2007 Ribbon, how the Ribbon works,...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Software Process Improvement: 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007, Proceedings
Software Process Improvement: 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007, Proceedings
This textbook is intended for use by SPI (software process improvement) managers and researchers, quality managers, and experienced project and research managers. The papers constitute the research proceedings of the 14th EuroSPI (European Software Process Improvement, www.eurospi.net) conference in Potsdam, September 26-28, 2007, Germany....
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
It's your job to make email safe.

Where do you start?

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the...

Software Process Improvement: 15th European Conference, EuroSPI 2008, Dublin, Ireland, September 3-5, 2008, Proceedings
Software Process Improvement: 15th European Conference, EuroSPI 2008, Dublin, Ireland, September 3-5, 2008, Proceedings
This textbook is intended for use by SPI (Software Process Improvement) managers and researchers, quality managers, and experienced project and research managers. The papers constitute the research proceedings of the 15th EuroSPI (European Software Process Improvement, www.eurospi.net) conference in Dublin, Ireland, 3–5 September 2008....
Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy