Home | Amazing | Today | Tags | Publishers | Years | Search 
Excel Best Practices for Business: Covers Excel 2003, 2002, and 2000
Excel Best Practices for Business: Covers Excel 2003, 2002, and 2000

Everything you need to know about

  • Implementing the new XML features in Spreadsheet Portals and Web Services
  • Auditing spreadsheets provided by third parties
  • Making spreadsheets accessible to individuals with disabilities
  • Performing spreadsheet makeovers
  • Constructing...
Towards the Semantic Web: Ontology-Driven Knowledge Management
Towards the Semantic Web: Ontology-Driven Knowledge Management
Generating huge interest and backed by the global WorldWideWeb consortium the semantic web is the key initiative driving the future of the World Wide Web. Towards the Semantic Web focuses on the application of Semantic Web technology and ontologies in particular to electronically available information to improve the quality of knowledge management...
Microsoft  Windows Server(TM) 2003 PKI and Certificate Security
Microsoft Windows Server(TM) 2003 PKI and Certificate Security
No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Microsoft Windows Server 2003! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication,...
Carrier Ethernet: Providing the Need for Speed
Carrier Ethernet: Providing the Need for Speed
Facilitating high data transfers over long distances at a reasonable cost, Carrier Ethernet is solidifying its fundamental position as the core of next-generation networks. Since it first dazzled the IT world 40 years ago with its ability to move data over local networks, Ethernet has dramatically evolved in both form and function. And now, Carrier...
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond does it again! He provides detailed real-world information that will make you an expert on Exchange 2003. This book is a clear, to-the-point source of information filled with sound practical advice. Whether you're new to Exchange or upgrading your existing Exchange
systems, this detailed guide can help you tap all the power,
...
Digital Communications: Fundamentals and Applications (2nd Edition)
Digital Communications: Fundamentals and Applications (2nd Edition)

Master every key digital communications technology, concept, and technique.

Digital Communications, Second Edition is a thoroughly revised and updated edition of the field's classic, best-selling introduction. With remarkable clarity, Dr. Bernard Sklar introduces every digital communication technology at the heart of today's wireless...

Quick CORBA 3
Quick CORBA 3
This book collects descriptions of the Object Management Group’s most powerful new CORBA and modeling specifications into a single volume. These specifications combine to give CORBA the capabilities it needs to support advanced Internet and enterprise computing. It includes almost all of the ten specifications originally labeled CORBA 3 (most...
High Performance Data Network Design (IDC Technology)
High Performance Data Network Design (IDC Technology)
The proliferation and complexity of data networks today is challenging our ability to design and manage them effectively. A new generation of Internet, e-commerce, and multimedia applications has changed traditional assumptions on traffic dynamics, and demands tight quality of service and security guarantees. These issues, combined with the...
IS Management Handbook, 8th Edition
IS Management Handbook, 8th Edition
The first few years of the new millennium have been a challenging time for the information technology (IT) manager. The initial economic euphoria that greeted the successful completion of Y2K projects worldwide was quickly followed by a dramatic shakedown within U.S.-based industries most closely related to the growth of the Internet. Today,...
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
Building A Global Information Assurance Program
Building A Global Information Assurance Program
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are...
Intelligent Techniques and Tools for Novel System Architectures (Studies in Computational Intelligence)
Intelligent Techniques and Tools for Novel System Architectures (Studies in Computational Intelligence)
This volume provides a source wherein academics, researchers and practitioners may derive high-quality, original and state-of-the-art papers describing theoretical aspects, systems architectures, analysis and design tools and techniques, and implementation experiences in intelligent systems where information and knowledge management should be...
Result Page: 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy