|
|
|
|
Cisco Wireless LAN SecurityCisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the... | | Assessment of AphasiaThis book is addressed to the practicing speech clinician and neuropsychologist dealing with aphasic adults and children, as well as with children who have delayed or disordered language development. It is also written as a primary or ancillary text in graduate courses dealing with the assessment of speech and language problems. To ... | | Practice Makes Perfect: Spanish Vocabulary (Practice Makes Perfect Series)
Language, like all forms of art and beauty, is about making connections and
enhancing life. Any human action, from writing a novel to taking a walk, can be
raised to the level of art. It can also be reduced to mechanics: functional, but
lifeless.
As you study Spanish, you can choose to approach it as an art form or as a... |
|
|
Perl Medic : Transforming Legacy CodeBring new power, performance, and scalability to your existing Perl code!
Today's Perl developers spend 60-80% of their time working with existing Perl code. Now, there's a start-to-finish guide to understanding that code, maintaining it, updating it, and refactoring it for maximum performance and reliability. Peter J. Scott, lead author of... | | Practical Standards for Microsoft Visual BasicAs members of a functional society, we adhere to standards every day of our lives. Often we don't think about these standards; rather, we take them for granted and apply them naturally. For instance, when you pull up to an intersection that's a four-way stop, you stop your car and check for cross-traffic. Once any cars already crossing the... | | Wireless Internet Security: Architecture and ProtocolsIn describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for... |
|
|
|
Result Page: 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 |