 |
|
 Team of Vipers: My 500 Extraordinary Days in the Trump White House
THE INSTANT NEW YORK TIMES BESTSELLER
"Sims’s vivid portrait of Trump shrewdly balances admiration with misgivings, and his intricate, engrossing accounts of White House vendettas and power plays have a good mix of immersion and perspective. The result is one of the best of the recent flood of... |  |  Conflicted American Landscapes
How conflicting ideas of nature threaten to fracture America's identity.
Amber waves of grain, purple mountain majesties: American invest much of their national identity in sites of natural beauty. And yet American lands today are torn by conflicts over science, religion, identity, and politics. Creationists ... |  |  Cisco CCIE Fundamentals: Network Design & Case StudiesFor a sophisticated view of networking design concepts that goes from lofty to granular in the blink of an eye, Network Design and Case Studies is a sure winner. This mammoth entry in Cisco's growing collection of reference books provides equal parts academic theory and practical application.
The first half of the book deals... |
|
 |  |  |  |  Video Systems in an IT Environment: The Essentials of Professional Networked MediaAudio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes technology reviews and the tools to understand and evaluate key aspects of hybrid AV... |
|
 The Definitive Guide to Interwoven TeamSite (Definitive Guides)
Adigital flood is upon us. Content inundates us. It begins as bits of content swirling everywhere—a document, an image, a written corporate procedure, a web page, or an email. The binary mist mixes, combines, and rains down on us. It pools in laptops, on desktops, and in server farms. Creeks and streams meander to corporate reservoirs.... |  |  Cisco Secure Intrusion Detection SystemOrganizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to... |  |  |
|
|
Result Page: 5 4 3 2 1 |