|
|
|
|
| | Syngress IT Security Project Management HandbookLet’s start by stating two assumptions we’re making in this book. First, we’re assuming you have a solid understanding of IT project management. If not, we have provided you with a free download of the book How to Cheat at IT Project Management (visit www.syngress.com/solutions to register this book and download the PDF) so you... | | |
|
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.
You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more... | | Windows Presentation Foundation Unleashed (WPF)Thank you for picking up Windows Presentation Foundation Unleashed! To avoid unsatisfied customers, I want to clarify that this is not a book about Microsoft PowerPoint (which many people consider to be the foundation of Windows presentations)! Windows Presentation Foundation (WPF) is Microsoft’s latest technology for creating graphical user... | | Parallel Iterative Algorithms: From Sequential to Grid ComputingComputer science is quite a young research area. However, it has already been subject to several major advance steps which, in general, have been closely linked to the technological progresses of the machine components. It can easily be assumed that the current evolution takes place at the level of the communication networks whose quality, either... |
|
|
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |