Home | Amazing | Today | Tags | Publishers | Years | Search 
TcL Scripting for Cisco IOS (Networking Technology)
TcL Scripting for Cisco IOS (Networking Technology)

A guide to building and modifying Tcl scripts to automate network administration tasks

 

Streamline Cisco network administration and save time with Tcl scripting

Cisco networking professionals are under relentless pressure to...

Open Source GIS: A GRASS GIS Approach
Open Source GIS: A GRASS GIS Approach
Over the past decade, Geographical Information Systems (GIS) have evolved from a highly specialized niche to a technology that affects nearly every aspect of our lives, from finding driving directions to managing natural disasters. While just a few years ago the use of GIS was restricted to a group of researchers, planners and...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany

The "European Institute for System Security (E.I.S.S.)" was founded on February 29, 1988 by cabinet resolution of the state government Baden-Wurttemberg. It is headed by Professor Thomas Beth and is affiliated with the Institute for Algorithms and Cognitive Systems (IAKS) of the Faculty for Computer Science at the University of...

Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Knowledge Discovery and Data Mining. Current Issues and New Applications: Current Issues and New Applications
Knowledge Discovery and Data Mining. Current Issues and New Applications: Current Issues and New Applications
The Fourth Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2000) was held at the Keihanna-Plaza, Kyoto, Japan, April 18 - 20, 2000. PAKDD 2000 provided an international forum for researchers and application developers to share their original research results and practical development experiences. A wide...
Melt Inclusions in Volcanic Systems: Methods, Applications and Problems (Developments in Volcanology)
Melt Inclusions in Volcanic Systems: Methods, Applications and Problems (Developments in Volcanology)
From September 264 to 30 th, 2002, a group of researchers met at Seiano di Vico Equense, on the Sorrento Peninsula, Italy, to participate in the "Workshop-Short Course on Volcanic Systems. Gecx:hcmical and Geophysical Monitoring. Melt Inclusions: Methods, Applications and Problems", sponsored by the Istituto Nazionalr di...
Basic Structures for Engineers and Architects
Basic Structures for Engineers and Architects
When I was 16 I had a Saturday job as a shelf-stacker at a local supermarket. One day, during a tea break, a co-worker asked me what I did the rest of the week. I explained that I had just done O Levels and was going on to do A Levels. I told him how many and in which subjects. He then asked me about my career aspirations (not...
Less Than Zero: The Case for a Falling Price Level in a Growing Economy (Hobart Papers)
Less Than Zero: The Case for a Falling Price Level in a Growing Economy (Hobart Papers)
One of main features of the 'counter-revolution' in economics which has resulted in the revival of classical liberal ideas has been a change in views about government's ability to control the economy. 'Fiscal fine tuning' is virtually discredited and monetary policy is no longer seen as a means of...
Deflation: What Happens When Prices Fall
Deflation: What Happens When Prices Fall
MAY 6, 2003, WAS AN EXTRAORDINARY DAY IN Washington, D.C. The Federal Reserve held its Federal Open Market Committee (FOMC) meeting in its two-storied chandeliered boardroom at the central bank's white marble temple on Constitution Avenue. Now, there was nothing unusual about the FOMC gathering. The committee meets...
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
The Hoover Dam (Building America: Then and Now)
The Hoover Dam (Building America: Then and Now)
The time was the early 1930s, the president was Herbert Hoover, and the situation in the United States looked bleak. The stock market had crashed in 1929, and most Americans were hurt by the Great Depression, which left a majority of them jobless, homeless, and penniless. But in the West, a beacon of hope was in the...
Result Page: 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy