|
|
|
|
VPNs Illustrated : Tunnels, VPNs, and IPsecVirtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually... | | Solaris Operating Environment Boot CampThe aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.
We present the chapters in the same chronological order that the system administrator... | | Content Computing: Advanced Workshop on Content Computing, AWCC 2004This book constitutes the refereed proceedings of the Advanced Workshop on Content Computing, AWCC 2004, held in Zhen Jiang, Jiang Su, China in November 2004.
The 26 revised full papers and 36 revised short papers presented were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections on mobile... |
|
|
Core J2EE Patterns: Best Practices and Design StrategiesOver the last few years, Java 2 Platform, Enterprise Edition (J2EE) technology has emerged and matured as a standard platform for building enterprise applications. While the platform has matured into a solid offering for developing and deploying enterprise applications, it does offer its challenges. As developers, often we confuse learning the... | | | | Silverlight 2 BibleCreate Web 2.0 applications from the inside out
Create rich, cross-platform, interactive Web applications with Microsoft's new Silverlight and this essential guide. Designers will discover how to add animation, audio, video, and other high-impact effects. Programmers will cover Visual Studio®, .NET, and other programming tools, and... |
|
|
|
Result Page: 462 461 460 459 458 457 456 455 454 453 452 451 450 449 448 447 446 445 444 |