Windows Admin Scripting Little Black Book, Second Edition This book shows Windows XP and 2003 users and administrators how to perform Windows management and administrative tasks using powerful scripts for just about every important task imaginable.
Windows Admin Scripting Little Black Book, 2nd Edition, shows Windows XP and 2003 users and administrators how to perform Windows management...
Real World Linux Security (2nd Edition)
Stop today's most vicious Internet attackers—right in their tracks!
Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...
The Lucent Library of Science and Technology - Artificial Intelligence As far back as the ancient Greek civilization, people have imagined machines and mechanical men that could work and think like any human. One Greek myth, for example, tells of the Greek god Hephaestus, who built mechanical men to forge powerful weapons and spectacular jewelry. When the king of Crete requested that he make a giant man to guard his... Microsoft Office Outlook 2007 Inside Out Learn everything you need to know for working with Microsoft Office Outlook 2007from the inside out! This book packs hundreds of time-saving solutions, troubleshooting tips, and workarounds for using Office Outlook 2007all in concise, fast-answer format. Whether you are upgrading from Office 97 or Office 2003, youll be able to dig in to the...
Handbook of Modern Sensors: Physics, Designs, and Applications
Seven years have passed since the publication of the previous edition of this book.
During that time, sensor technologies have made a remarkable leap forward. The
sensitivity of the sensors became higher, the dimensions became smaller, the selectivity
became better, and the prices became lower. What have not changed are the... Implementing 802.1X Security Solutions for Wired and Wireless Networks When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
|Result Page: 7 6 5 4 3 2 1 |