 |
|
 CYA Securing IIS 6.0Network System Administrators operate in a high-stress environment, where the competitive demands of the business often run counter to textbook “best practices”. Design and planning lead times can be nonexistent and deployed systems are subject to constant end-runs; but at the end of the day, you, as the Administrator, are held... |  |  The Project Manager's Toolkit (Computer Weekly Professional)'The Project Manager's Toolkit' provides a quick reference checklist approach to drive an IT development project as well as solve issues that arise in the process. It can be used proactively to set a project on the right course and reactively for solutions to problems.
It will:
* help identify what needs doing next on an IT... |  |  |
|
 Computer Forensics: Computer Crime Scene Investigation (Networking Series)The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package... |  |  |  |  |
|
|
 IT Performance Management (Computer Weekly Professional)IT Performance Management addresses the way organizations should balance the demand and the supply of information technology, optimizing the cost and maximizing the business value of IT.
In this book several aspects of IT performance management are described. The way this management is executed and the techniques, which... |  |  |  |  Design and Analysis of Experiments (Springer Texts in Statistics)The design and analysis of experiments is an essential part of investigation and discovery in science, of process and product improvement in manufacturing, and of comparison of competing protocols or treatments in the applied sciences. This book offers a step by step guide to the experimental planning process and the ensuing analysis of... |
|
Result Page: 9 8 7 6 5 4 3 2 1 |