Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and... The Hidden Power of Photoshop CS AlthoughI wasn’t really thinking about it at the time, in a way, I really started writing this book in 1992 when I first started using Photoshop professionally (with Photoshop 2). At the time I wasn’t planning to write a book, but I had already been involved with scanning and editing digital artwork for several years. I had become...
60 Recipes for Apache CloudStack: Using the CloudStack Ecosystem
Planning to deploy and maintain a public, private, or hybrid cloud service? This cookbook’s handy how-to recipes help you quickly learn and install Apache CloudStack, along with several API clients, API wrappers, data architectures, and configuration management technologies that work as part of CloudStack’s ecosystem....
Deploying IPv6 Networks
An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.
Learn about IPv6 services and the relevant IPv6 features that make them possible
Plan, deploy, and manage IPv6 services at...
The McGraw-Hill 36-Hour Course: Project Management, Second Edition
Schedule and coordinate projects seamlessly, start to finish!
In today's ultracompetitive world of business, those in charge want results on time and on budget--and they're turning to project managers to deliver. Skilled project managers are in high demand, and the profession is growing at an unprecedented rate.
|Result Page: 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 |