Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Assurance: Managing Organizational IT Security Risks
Information Assurance: Managing Organizational IT Security Risks
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted...
Connections: Patterns of Discovery
Connections: Patterns of Discovery
Every since the fl int axe triggered the Paleolithic Revolution over two million years ago we have lived by a culture of scarcity. Technology shortfall placed innovative capability in the hands of only a few: those who provided their hunter - gatherer communities with tools for hunting and butchering; then those who could read and write; then, much...
Beginning Mac OS X Programming
Beginning Mac OS X Programming

Beginning Mac OS X Programming

Every Mac OS X system comes with all the essentials required for programming: free development tools, resources, and utilities. However, finding the place to begin may be challenging, especially if you have no prior development knowledge. This comprehensive guide offers you an ideal starting point to...

Mastering ColdFusion MX
Mastering ColdFusion MX
This book is designed to teach you how to develop sophisticated, dynamic, and interactive websites by using ColdFusion.

ColdFusion, launched in 1995 by Allaire Corporation (now owned by Macromedia), was the first web application server available for Windows NT–based web servers. ColdFusion is now in a new version named MX, which is
...
SQL Clearly Explained, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
SQL Clearly Explained, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
It covers proper structure of SQL queries, how to produce a desired result and minimize a burden on SQL command processors, and how to modify data and database structure for ease of use and increased efficiency. Paper. DLC: SQL (Computer program language). --This text refers to an out of print or unavailable edition of this title....
Windows Server 2008 All-In-One Desk Reference For Dummies (Computer/Tech)
Windows Server 2008 All-In-One Desk Reference For Dummies (Computer/Tech)

Covers the all-new Windows Server 2008!

Your one-stop guide to setting up, using, and maintaining Windows Server 2008

If, like many system administrators, you've been waiting impatiently for the arrival of Windows Server 2008, wait no more! It's here, and so is this book to help...

Wireless Positioning Technologies and Applications (Technology and Applications)
Wireless Positioning Technologies and Applications (Technology and Applications)
At last--here's a comprehensive book that puts full details on all short-range wireless-positioning methods at your command for instant access and use. This one-stop resource surveys each technique's theory of operation, advantages and disadvantages, applicability in different domains, implementation procedures, and accuracy to help you select the...
The BASIC handbook, an encyclopedia of the BASIC computer language
The BASIC handbook, an encyclopedia of the BASIC computer language
With the roots of the BASIC language now firmly established throughout the world, it is necessary to make its many dialects understandable so programs can be transported between different computer. After you've found just the program you've been looking for, you know how frustrating it is only to discover that it won't RUN on your computer. This...
SSL Remote Access VPNs (Networking Technology: Security)
SSL Remote Access VPNs (Networking Technology: Security)
This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,...
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
This serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:

  • Shows you how to speed it up, lock it down, or pull back the curtains.
  • Dives into default system settings,...
Readings in Multimedia Computing and Networking (The Morgan Kaufmann Series in Multimedia Information and Systems)
Readings in Multimedia Computing and Networking (The Morgan Kaufmann Series in Multimedia Information and Systems)
READINGS in Multimedia Computing is a collection of seminal research papers culled from the literature of the last ten years. Although the origins of multimedia computing and networking can be traced back to the development of systems such as the AT&T Picturephone in the late 1960s, it wasn't until the 1990s that the field came into its own....
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Take command of core technologies at the heart of all telecommunications systems with the first book expressly designed to help you apply, reuse, and enhance building-block components from one generation of networks to the next. This unique problem-solver unravels the complexities behind such technologies as synchronization, multiple access,...
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy