 |
|
 |  |  Beautiful Security: Leading Security Experts Explain How They ThinkIn this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found... |  |  |
|
 Memory Systems: Cache, DRAM, DiskThe first book to comprehensively cover the intricacies of optimizing the behavior of modern memory systems using a holistic design approach.
Is your memory hierarchy stopping your microprocessor from performing at the high level it should be? Memory Systems: Cache, DRAM, Disk shows you how to resolve this problem. ... |  |  Head First AjaxAjax is no longer an experimental approach to website development, but the key to building browser-based applications that form the cornerstone of Web 2.0. Head First Ajax gives you an up-to-date perspective that lets you see exactly what you can do -- and has been done -- with Ajax. With it, you get a highly practical, in-depth, and... |  |  Physical Security for IT"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each... |
|
 Control Techniques for Complex NetworksA representative of a major publishing house is on her way home from a conference in Singapore, excited about the possibility of a new book series. On the flight home to New York she opens her blackberry organizer, adding names of new contacts, and is disappointed to realize she may have caught the bug that was bothering her friend Alex at the... |  |  The Entrepreneur's Guide to Managing Information TechnologySoftware. Hardware. Networks. Wireless. Entrepreneurs face a bewildering array of choices and decisions when it comes to incorporating technology into the fabric of their businesses. Yet nothing could be more important these days. Aligning information technology (IT) with business strategy is essential to meet and beat the competition. As business... |  |  Encyclopedia of Civil War ShipwrecksOn the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,... |
|
 How to Do Everything with Microsoft Office LiveGet your e-business started with ease and quickly boost sales and productivity with help from this hands-on guide. How to Do Everything with Microsoft Office Live explains how to harness this all-in-one service to create and maintain a dynamic online presence for your business. Learn how to set up a commerce-driven website and take... |  |  Becoming Agile: ...in an imperfect worldMany books discuss Agile from a theoretical or academic perspective. Becoming Agile takes a different approach and focuses on explaining Agile from a case-study perspective. Agile principles are discussed, explained, and then demonstrated in the context of a case study that flows throughout the book. The case study is based on a mixture of... |  |  Managing Indoor Air Quality, Fourth EditionAs predicted in the earlier editions, concerns over Indoor Air Quality (IAQ) have driven it to the forefront of current workplace problems. More than ever, health, economic and legal matters associated with IAQ seem destined to make it a dominant problem for developers, owners and managers of commercial and institutional properties well into this... |
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 |