 |
|
 |  |  |  |  Deploying LINUX on the DesktopCovering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!
Looking at the world of the... |
|
|
 Trust and Security in Collaborative Computing (Computer and Network Security)Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group... |  |  Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... |  |  Weaving a Library Web: A Guide to Developing Children's WebsitesWe have entered a digital age in which preschoolers can handle a mouse better than a crayon. In this digital world children want to interact with information, not just receive it. Technology is as ordinary to them as television and radio were to previous generations. Computers and the Internet provide them with information and entertainment,... |
|
|
| Result Page: 314 313 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 |