Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Communications: Fundamentals and Applications (2nd Edition)
Digital Communications: Fundamentals and Applications (2nd Edition)

Master every key digital communications technology, concept, and technique.

Digital Communications, Second Edition is a thoroughly revised and updated edition of the field's classic, best-selling introduction. With remarkable clarity, Dr. Bernard Sklar introduces every digital communication technology at the heart of today's wireless...

Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond does it again! He provides detailed real-world information that will make you an expert on Exchange 2003. This book is a clear, to-the-point source of information filled with sound practical advice. Whether you're new to Exchange or upgrading your existing Exchange
systems, this detailed guide can help you tap all the power,
...
Local Area Network Management, Design & Security
Local Area Network Management, Design & Security
Most workplaces rely on local area networks (LANs) to connect their computers and the right LAN is increasingly important in promoting effective communication both within the organisation and with the world at large.

Local Area Network Management, Design and Security is a practical and thorough introduction to managing and
...
Grid Computing for Bioinformatics and Computational Biology (Wiley Series in Bioinformatics)
Grid Computing for Bioinformatics and Computational Biology (Wiley Series in Bioinformatics)
The only single, up-to-date source for Grid issues in bioinformatics and biology

Bioinformatics is fast emerging as an important discipline for academic research and industrial applications, creating a need for the use of Grid computing techniques for large-scale distributed applications. This book successfully presents Grid algorithms and...

Internet Based Workflow Management: Towards a Semantic Web
Internet Based Workflow Management: Towards a Semantic Web
Today, an ever-expanding set of human activities, ranging from business processes to healthcare to education and research, is dependent upon the Internet. Most processes involve a workflow, the coordinated execution of multiple activities. In a given application, once the key stages of the workflow have been isolated, an infrastructure to...
The Real MCTS/MCITP Exam 70-647 Prep Kit: Independent and Complete Self-Paced Solutions
The Real MCTS/MCITP Exam 70-647 Prep Kit: Independent and Complete Self-Paced Solutions
Independent and unbiased self-paced study with fully integrated book, practice exams, and e-learning modules.

This exam is designed to validate skills as a Windows Server 2008 Enterprise Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-647.

The Microsoft
...
Understanding IPv6, Second Edition
Understanding IPv6, Second Edition
Now updated for Windows Server 2008 and Windows Vista, this guide delivers in-depth technical information on Internet Protocol version 6 (IPv6). IPv6 greatly improves on IPv4, the current protocol, by vastly increasing the number of available addresses and by adding enhancements for security, multimedia traffic management, routing, and network...
A Developer's Guide to Data Modeling for SQL Server: Covering SQL Server 2005 and 2008
A Developer's Guide to Data Modeling for SQL Server: Covering SQL Server 2005 and 2008
Model SQL Server Databases That Work Better, Do More, and Evolve More Smoothly

Effective data modeling is essential to ensuring that your databases will perform well, scale well, and evolve to meet changing requirements. However, if you’re modeling databases to run on Microsoft SQL Server 2008 or 2005, theoretical
...
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia...
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
It's your job to make email safe.

Where do you start?

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the...

Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
CISA Review Manual 2008
CISA Review Manual 2008
The CISA Review Manual 2008 has been completely revised and updated with new content to reflect changing industry principles and practices, and is organized according to the current CISA job practice areas. The manual features detailed descriptions of the tasks performed by IS auditors and the knowledge required to plan, manage and perform IS...
Result Page: 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy