Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deploying IPv6 Networks
Deploying IPv6 Networks

An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.

  • Learn about IPv6 services and the relevant IPv6 features that make them possible

  • Plan, deploy, and manage IPv6 services at...

Business Creativity: Breaking the Invisible Barriers
Business Creativity: Breaking the Invisible Barriers
Many companies and organizations have found it difficult to develop creative skills. The authors argue that while individuals have inherent creativity there are a number of assassins or barriers that block individual creative development. This bold new approach to creativity enhancement will focus upon how to remove barriers and create...
CEH: Certified Ethical Hacker Version 8 Study Guide
CEH: Certified Ethical Hacker Version 8 Study Guide

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide

Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that...

CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

XML-Based Integration Using XA-Suite: Unifying Applications and Data in Today's e-Business World
XML-Based Integration Using XA-Suite: Unifying Applications and Data in Today's e-Business World

In order for a business to thrive in today’s dynamic world, its computing infrastructure must enable the secure flow of information—not only within the business but also with suppliers and customers. However, many of today’s computing infrastructures suffer from “information chaos” and are unable to support this...

RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)
Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)

The innate immune system represents a critical arm of the immune response by providing immediate and robust host defense; however, human studies of its function are often limited by ethical, logistical, and technical obstacles. In Mouse Models of Innate Immunity: Methods and Protocols, experts in the field explore the design and...

Absolute Beginner's Guide to Security, Spam, Spyware & Viruses
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses

Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? ...

Schrodinger's Rabbits: The Many Worlds of Quantum
Schrodinger's Rabbits: The Many Worlds of Quantum
"Usually quantum fuzziness appears only in ultratiny arenas, on a scale smaller than a golf ball to the degree that the golf ball is smaller than Texas. But nowadays, in labs around the world, scientists are plotting to release quantum weirdness from its subatomic prison. Before too long, quantum news won't be just for the science section...
Transforming Enterprise Cloud Services
Transforming Enterprise Cloud Services

Transforming Enterprise Cloud Services addresses the fundamental ideology of Cloud Services and how enterprises in commercial, federal, and defense industries can transform their current information technology and management models to adopt this new method. It goes beyond the mere description of service frameworks in relation to...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
The Lucent Library of Science and Technology - Artificial Intelligence
The Lucent Library of Science and Technology - Artificial Intelligence
As far back as the ancient Greek civilization, people have imagined machines and mechanical men that could work and think like any human. One Greek myth, for example, tells of the Greek god Hephaestus, who built mechanical men to forge powerful weapons and spectacular jewelry. When the king of Crete requested that he make a giant man to guard his...
unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy