Home | Amazing | Today | Tags | Publishers | Years | Search 
Effective IT Service Management: To ITIL and Beyond!
Effective IT Service Management: To ITIL and Beyond!
IT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, every IT project and system would deteriorate over time until failure. ITIL is the recognized best-practice standard for ITSM, and has been around since the late 1980s, with ITIL version 3 published just recently. However, many...
Spatial Database Systems: Design, Implementation and Project Management (GeoJournal Library)
Spatial Database Systems: Design, Implementation and Project Management (GeoJournal Library)
This first of a kind book places spatial data within the broader domain of information technology (IT) while providing a comprehensive and coherent explanation of the guiding principles, methods, implementation and operational management of spatial databases within the workplace. The text explains the key concepts, issues and processes of spatial...
Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Beginning PL/SQL: From Novice to Professional
Beginning PL/SQL: From Novice to Professional
This is a book about writing stored procedures for an Oracle database. A stored procedure in this context is a generic term for a program written in the Procedure Language extension for SQL (PL/SQL) that is stored inside the database when it is compiled. This means that you can then execute the program from inside the database. Why would you want...
Advances in Enterprise Information Technology Security (Premier Reference)
Advances in Enterprise Information Technology Security (Premier Reference)
In the last decade information and computer security is mainly moving from the confines of academia to the enterprise concerns. As populations become more and more comfortable with the extensive use of networks and the Internet, as our reliance on the knowledge-intensive technology grows, and as progress in the computer software and wireless...
Anti-Spam Measures: Analysis and Design
Anti-Spam Measures: Analysis and Design
The primary goal of this work is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. These determine to which extent the measures can contribute to the reduction of spam in the long run. The range of considered anti-spam measures includes legislative, organizational, behavioral and technological...
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
The Internet, or the ARPANET in its original name, was a remarkable idea. The Net was designed in the late 60's by US ARPA (Advanced Research Projects Agency) to connect distant computers to each other. This was a critical need at a time when each computer was a precious resource of computing power, which, if connected, could be shared among...
Network Warrior
Network Warrior

Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very...

Optical Switching / Networking and Computing for Multimedia Systems (Optical Engineering)
Optical Switching / Networking and Computing for Multimedia Systems (Optical Engineering)
We have witnessed the rapid growth in the popularity of the Internet technology over the past few years. The current network technologies provide ubiquitous access to a vast amount of information on a huge variety of topics, but limited bandwidth has constrained the impact and growth of broadband multimedia applications. To allow new broadband...
Securing Converged IP Networks
Securing Converged IP Networks
This book offers advice on a range of critical subjects pertaining to security practices and procedures. Anyone moving toward a converged platform will find the approach beneficial and illuminating.
Phil Norton, Arthur J. Gallagher & Co.

This book delivers a requisite insight for security professionals to understand the scope and...

Advanced Verification Techniques: A SystemC Based Approach for Successful Tapeout
Advanced Verification Techniques: A SystemC Based Approach for Successful Tapeout
"As chip size and complexity continue to grow exponentially, the challenges of functional verification are becoming a critical issue in the electronics industry. It is now commonly heard that logical errors missed during functional verification are the most common cause of chip re-spins, and that the costs associated with functional...
Professional Software Testing with Visual Studio 2005 Team System: Tools for Software Developers and Test Engineers (Programmer to Programmer)
Professional Software Testing with Visual Studio 2005 Team System: Tools for Software Developers and Test Engineers (Programmer to Programmer)
With the introduction of Visual Studio 2005 Team System (VSTS), Microsoft for the first time offers software developers and test engineers a complete and integrated suite of tools for software testing. This authoritative book shares with you best practices for software testing using VSTS test and development tools and covers all phases of the...
Result Page: 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy