Technological Turf Wars: A Case Study of the Computer Antivirus Industry Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems... Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the
dynamics of the computer software industry for the next long while, just as it has for the
last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers
to software in which the source code is freely available to... Everyday Leadership: Getting Results in Business, Politics, and Life
?A book that truly speaks to everyone. . . . Always practical, often inspiring, this is more a reference book than a self-improvement text, and a great read for any would-be leader.”
?Roger Penske, owner of Penske Corporation and Penske Racing
?Sound, practical advice driven home with real-world examples. . . . This...
802.11 WLANs and IP Networking: Security, QoS, and Mobility Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.
“How do IEEE 802.11 wireless local area networks (WLANs) work together
George Silverman's Explanation WHAT do I know of Hoghton Towers? Very little; for I have been gratefully unwilling to disturb my first impressions. A house, centuries old, on high ground a mile or so removed from the road between Preston and Blackburn, where the first James of England, in his hurry to make money by making baronets, perhaps made some of those remunerative...
|Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 |