|
|
|
|
| | | | Internet Technologies Handbook: Optimizing the IP NetworkThe Internet is an amazing communication medium. Its predecessor network, the ARPANET, was developed over three decades ago, yet many of the fundamental algorithms and protocols are still in use today. Granted, we don’t have to run these protocols on a refrigerator-sized computer; our laptop or palmtop PC will do quite well. But think of it -... |
|
Twitter Power 2.0: How to Dominate Your Market One Tweet at a Time
Get the business leader's guide to using Twitter to gain competitive advantage.
Since 2006, forward-thinking companies like Apple, JetBlue, Whole Foods, and GM have discovered the instant benefits of leveraging the social media phenomenon known as Twitter to reach consumers directly, build their brand, and increase sales.... | | When Does Terrorism Work? (Extremism and Democracy)
This book examines the question of when terrorism works. Determining if political violence is effective and, if at all possible, when it is effective, is vital for both intellectual and practical reasons. The volume contains chapters from scholars who have been at the forefront of the efficaciousness debate and argues that terrorism... | | Mac OS X 10.5 Leopard: Visual QuickStart GuideApple’s next version of its OS, code-named Leopard, will keep Mac users in the forefront of making the most from their computers. Respected, best-selling author Maria Langer takes readers through Mac OS X’s groundbreaking capabilities, including new applications such as Time Machine and Spaces and revamped applications such as Mail,... |
|
|
| | McGraw-Hill Concise Encyclopedia of Science & Technology, Fifth EditionThoroughly revised and updated, this new edition is based on the content of the world-renowned McGraw-Hill Encyclopedia of Science & Technology, Ninth Edition, the most widely used science reference of its kind. Readers will find concise, authoritative, and up-to-date articles on every major field of science and technology -- by... | | Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion
Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft® Forefront® Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best... |
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |