Deploying Cisco Voice over IP Solutions If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in... Windows XP For Dummies, 2nd Edition Covers the latest Windows XP updates including Service Pack 2
Fully revised to quickly answer your XP questions
You asked for more coverage of Outlook Express, scanning and faxing, CD burning, and more in Windows XP For Dummies — and we delivered! This updated edition is packed with answers to your Windows XP questions, from...
World Class IT: Why Businesses Succeed When IT Triumphs
Prior to the 1970s, computer and electronics-based technology
was hardly a pervasive part of our everyday lives. Automobiles
were not yet computerized, fax machines were just taking off, and,
significantly, the personal computer had yet to be popularized.
Individuals who dreamed of a career in information technology
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools Like the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used... Privacy Protection and Computer Forensics, Second Edition This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
|Result Page: 4 3 2 1 |