|
|
|
|
Alfresco 3 Records Management
This book is structured in a sequential way that walks you through the steps necessary to set up your Alfresco Records Management system. Chapters follow a logical progression with each chapter building on the knowledge and implementation details learned in earlier chapters. If you are a records manager, business analyst, or a software... | | After Nationalism: Being American in an Age of Division (Radical Conservatisms)
Nationalism is on the rise across the Western world, serving as a rallying cry for voters angry at the unacknowledged failures of globalization that has dominated politics and economics since the end of the Cold War. In After Nationalism, Samuel Goldman trains a sympathetic but skeptical eye on the trend, highlighting the deep... | | C++ for DummiesCreate your first C++ program before you finish Chapter 1!
The fun and easy way® to start programming with this popular, object-oriented language
This friendly guide is now updated to cover the latest ANSI C++ standard. Even if you’re a programming newbie, you’ll be building and debugging C++ programs, creating... |
|
|
|
Managing Cisco Network SecurityInformation security has become an extremely important topic for everyone over the past few years. In today’s environment the number of touch points between an organization’s information assets and the outside world has drastically increased: millions of customers can interact via a Web site, thousands of employees and partners may... | | Enterprise Security: The Manager's Defense GuideE-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's... | | Cisco Secure Intrusion Detection SystemOrganizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |