 |
|
|
|
 Syngress Force 2006 Emerging Threat Analysis: From Mischief to MaliciousOver the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and... |  |  The Hidden Power of Photoshop CSAlthoughI wasn’t really thinking about it at the time, in a way, I really started writing this book in 1992 when I first started using Photoshop professionally (with Photoshop 2). At the time I wasn’t planning to write a book, but I had already been involved with scanning and editing digital artwork for several years. I had become... |  |  |
|
|
 60 Recipes for Apache CloudStack: Using the CloudStack Ecosystem
Planning to deploy and maintain a public, private, or hybrid cloud service? This cookbook’s handy how-to recipes help you quickly learn and install Apache CloudStack, along with several API clients, API wrappers, data architectures, and configuration management technologies that work as part of CloudStack’s ecosystem. ... |  |  Deploying IPv6 NetworksAn essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.
-
Learn about IPv6 services and the relevant IPv6 features that make them possible
-
Plan, deploy, and manage IPv6 services at... |  |  The McGraw-Hill 36-Hour Course: Project Management, Second Edition
Schedule and coordinate projects seamlessly, start to finish!
In today's ultracompetitive world of business, those in charge want results on time and on budget--and they're turning to project managers to deliver. Skilled project managers are in high demand, and the profession is growing at an unprecedented rate.
... |
|
|
|
Result Page: 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 |