 |
|
|
|
|
 Network-Centric Service Oriented EnterpriseThe emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for... |  |  Deploying IPv6 NetworksAn essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.
-
Learn about IPv6 services and the relevant IPv6 features that make them possible
-
Plan, deploy, and manage IPv6 services at... |  |  Business Creativity: Breaking the Invisible Barriers
Many companies and organizations have found it difficult to develop creative skills. The authors argue that while individuals have inherent creativity there are a number of assassins or barriers that block individual creative development. This bold new approach to creativity enhancement will focus upon how to remove barriers and create ... |
|
|
 RFID Handbook: Applications, Technology, Security, and PrivacyRadio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it... |  |  |  |  Absolute Beginner's Guide to Security, Spam, Spyware & VirusesBatten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? ... |
|
|
Result Page: 35 34 33 32 31 30 29 28 27 26 25 |