 |
|
 TcL Scripting for Cisco IOS (Networking Technology)
A guide to building and modifying Tcl scripts to automate network administration tasks
Streamline Cisco network administration and save time with Tcl scripting
Cisco networking professionals are under relentless pressure to... |  |  Open Source GIS: A GRASS GIS Approach
Over the past decade, Geographical Information Systems (GIS) have evolved
from a highly specialized niche to a technology that affects nearly every aspect
of our lives, from finding driving directions to managing natural disasters.
While just a few years ago the use of GIS was restricted to a group of
researchers, planners and... |  |  |
|
 |  |  Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
these... |  |  |
|
 |  |  Basic Structures for Engineers and Architects
When I was 16 I had a Saturday job as a shelf-stacker at a local supermarket.
One day, during a tea break, a co-worker asked me what I did the rest
of the week. I explained that I had just done O Levels and was going on to
do A Levels. I told him how many and in which subjects. He then asked
me about my career aspirations (not... |  |  |
|
 Deflation: What Happens When Prices Fall
MAY 6, 2003, WAS AN EXTRAORDINARY DAY IN
Washington, D.C. The Federal Reserve held its
Federal Open Market Committee (FOMC)
meeting in its two-storied chandeliered boardroom
at the central bank's white marble temple on
Constitution Avenue. Now, there was nothing
unusual about the FOMC gathering. The committee meets... |  |  Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and... |  |  The Hoover Dam (Building America: Then and Now)
The time was the early 1930s, the president was Herbert
Hoover, and the situation in the United States looked bleak.
The stock market had crashed in 1929, and most Americans were
hurt by the Great Depression, which left a majority of them jobless,
homeless, and penniless. But in the West, a beacon of hope
was in the... |
|
Result Page: 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 |