 |
|
 Executive's Guide to Cloud Computing
Your organization can save and thrive in the cloud with this first non-technical guide to cloud computing for business leaders
In less than a decade Google, Amazon, and Salesforce.com went from unknown ideas to powerhouse fixtures in the economic landscape; in even less time offerings such as Linkedin, Youtube, Facebook,... |  |  Beginning WordPress 3
One of the most popular open source blogging and content management systems, WordPress lets you create a website to promote yourself or your business quickly and easilyâ?"and better yet, it's free. WordPress is a flexible, user-friendly system, and it can be extended with a variety of themes and plugins.
... |  |  Metrics and Methods for Security Risk Management
Metrics and Methods for Security Risk Management offers powerful analytic tools that have been absent from traditional security texts. This easy-to-read text provides a handy compendium of scientific principles that affect security threats, and establishes quantitative security metrics that facilitate the development of... |
|
 Official Ubuntu Book, The (5th Edition)
Ubuntu is a complete, free operating system that emphasizes community, support, and ease of use without compromising speed, power, or flexibility. It’s Linux for human beings, designed for everyone from computer novices to experts. Ubuntu 10.04 is the latest release—more powerful, more flexible, and friendlier than ever. The... |  |  |  |  WordPress 2.8 Themes Cookbook
Themes are among the most powerful features that can be used to customize a web site and give it a professional look, especially in WordPress. Using custom themes you can brand your site for a particular corporate image, ensure standards compliance, and create easily navigable layouts. But most WordPress users still continue to use default... |
|
 Hacking Exposed Wireless, Second Edition
The latest wireless security solutions
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily... |  |  Pro Python System Administration
As time goes on, system administrators are presented with increasingly complicated challenges. In the early days, a team of engineers might have had to look after one or two systems. These days, one engineer can administer hundreds or thousands of systems.
System administrators are gradually replacing their tools with more advanced... |  |  Triple Play: Building the converged network for IP, VoIP and IPTV
“Triple Play”is a combination of Internet access, voice communication (telephony), and entertainment services such as IP television and video on demand.
The erosion of the traditional voice service, together with the ever-increasing competition between companies, is pushing the telecommunications industry... |
|
|
| Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 |