Home | Amazing | Today | Tags | Publishers | Years | Search 
E-Commerce: A Control and Security Guide
E-Commerce: A Control and Security Guide

Once scoffed at during the dot.com year, the formerly staid, old, “brick and mortar” companies have now fully recognized and implemented the value of the Internet. Their new online infrastructure allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and mortar” is now “brick and...

Network Management: Accounting and Performance Strategies
Network Management: Accounting and Performance Strategies
Understanding network performance and effectiveness is now crucial to business success. To ensure user satisfaction, both service providers and enterprise IT teams must provide service-level agreements (SLA) to the users of their networks–and then consistently deliver on those commitments. Now, two of the Cisco® leading network...
Deploying Voice over Wireless LANs (Networking Technology)
Deploying Voice over Wireless LANs (Networking Technology)

The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions

 

Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly...

Professional Windows Vista Gadgets Programming (Programmer to Programmer)
Professional Windows Vista Gadgets Programming (Programmer to Programmer)
Professional Windows Vista Gadgets Programming

As an easy-to-use application that provides information at a glance, a gadget basically takes the concept of portal dashboards and moves them to the more accessible Windows desktop where users can quickly and easily obtain weather information, RSS news feeds, and much more. In...

IT Essentials: PC Hardware and Software Labs and Study Guide (3rd Edition) (Lab Companion)
IT Essentials: PC Hardware and Software Labs and Study Guide (3rd Edition) (Lab Companion)
The IT Essentials: PC Hardware and Software version 4 course in the Cisco® Networking Academy® is designed to prepare you to take and pass the CompTIA A+ exams based on the 2006 objectives. You must pass both the A+ Essentials and one of the technician exams to earn the A+ certification. Chapters 1 through 10 cover the foundational...
Professional IIS 7 and ASP.NET Integrated Programming
Professional IIS 7 and ASP.NET Integrated Programming
The deep integration of IIS 7 and ASP.NET provides both IIS 7 administrators and ASP.NET developers with new and exciting programming tools, techniques, and approaches that were not possible with earlier versions of IIS. With this book, Dr. Shahram Khosravi presents you with the only resource to focus exclusively on the key features of this...
Switch-Mode Power Supply Simulation: Designing with SPICE 3 (McGraw-Hill Electronic Engineering)
Switch-Mode Power Supply Simulation: Designing with SPICE 3 (McGraw-Hill Electronic Engineering)
A MASTER CLASS IN POWER SUPPLY DESIGN THROUGH CIRCUIT SIMULATION
  • PSpice AND SPICE 3 models
  • Selected examples from the book
  • Getting started with Converter Design and Analysis
  • Solving Convergence Problems
  • CD with OrCAD/PSpice Examples

With...

Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider...
Dissemination of Information in Optical Networks:: From Technology to Algorithms (Texts in Theoretical Computer Science. An EATCS Series)
Dissemination of Information in Optical Networks:: From Technology to Algorithms (Texts in Theoretical Computer Science. An EATCS Series)
Optical networks and the related technologies, network management software and services have undergone remarkable developments, and such networks are now the ultra-high-speed backbone networks for communication. Wavelength-Division Multiplexing (WDM), the ability to support multiple communication pathways over the same fiber, enables efficient use...
Creating Assertion-Based IP (Series on Integrated Circuits and Systems)
Creating Assertion-Based IP (Series on Integrated Circuits and Systems)
Assertion-based IP is much more than a comprehensive set of related assertions. It is a full-fledged reusable and configurable transaction-level verification component, which is used to detect both interesting and incorrect behaviors. Upon detecting interesting or incorrect behavior, the assertion-based IP alerts other verification components...
Fundamental Approaches to Software Engineering
Fundamental Approaches to Software Engineering
This book constitutes the refereed proceedings of the 7th International Conference on Fundamental Approaches to Software Engineering, FASE 2004, held in Barcelona, Spain, in March/April 2004.

The 22 revised full papers and 4 tool presentation papers presented together with an invited paper and the abstract of another invited talk were carefully...

Building Trustworthy Semantic Webs
Building Trustworthy Semantic Webs
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community boundaries. However, this improved accessibility poses a greater threat of unauthorized access, which could lead to the malicious corruption of...
Result Page: 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy