Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft  Windows  SharePoint  Services 3.0 Step by Step
Microsoft Windows SharePoint Services 3.0 Step by Step

The smart way to learn Microsoft Windows SharePoint Services Version 3.0 one step at a time! Work at your own pace through the easy numbered steps, practice files, helpful hints, and troubleshooting tips to master the fundamentals of working with the latest version of Windows SharePoint Services. You will learn the essentials for creating and...

Dictionary of Internetworking Terms and Acronyms
Dictionary of Internetworking Terms and Acronyms
Comprehensive reference resource for terms found everyday in the work of students, Cisco systems professionals, and others who use Cisco systems on a regular basis. Includes thorough coverage of recent technologies and updated definitions and acronyms for key
  • Your portable reference of internetworking terms and definitions
  • ...
Special Edition Using® FileMaker® 7
Special Edition Using® FileMaker® 7

Once upon a time, you were an experienced FileMaker user. Now there's an updated version of the software and you feel like you're back at the beginning of the story. Special Edition Using FileMaker 7 can help you get back to "happily ever after" with your database building skills....

End-to-End Network Security: Defense-in-Depth
End-to-End Network Security: Defense-in-Depth
The network security lifecycle requires specialized support and a commitment to best practice standards. In this book, you will learn best practices that draw upon disciplined processes, frameworks, expert advice, and proven technologies that will help you protect your infrastructure and organization. You will learn end-to-end security best...
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions...

Packet Broadband Network Handbook
Packet Broadband Network Handbook
BROADBAND DECISION SUPPORT

One thing at least is certain about tomorrow's global communications: broadband networks will be packetized. But how exactly will we get there from here? Before all the i's get dotted and t's crossed, leaders in telecom and networking have to make some hard choices. This is the book that can...

Beginning PL/SQL: From Novice to Professional
Beginning PL/SQL: From Novice to Professional
This is a book about writing stored procedures for an Oracle database. A stored procedure in this context is a generic term for a program written in the Procedure Language extension for SQL (PL/SQL) that is stored inside the database when it is compiled. This means that you can then execute the program from inside the database. Why would you want...
Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Spatial Database Systems: Design, Implementation and Project Management (GeoJournal Library)
Spatial Database Systems: Design, Implementation and Project Management (GeoJournal Library)
This first of a kind book places spatial data within the broader domain of information technology (IT) while providing a comprehensive and coherent explanation of the guiding principles, methods, implementation and operational management of spatial databases within the workplace. The text explains the key concepts, issues and processes of spatial...
Effective IT Service Management: To ITIL and Beyond!
Effective IT Service Management: To ITIL and Beyond!
IT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, every IT project and system would deteriorate over time until failure. ITIL is the recognized best-practice standard for ITSM, and has been around since the late 1980s, with ITIL version 3 published just recently. However, many...
Secure Data Management in Decentralized Systems (Advances in Information Security)
Secure Data Management in Decentralized Systems (Advances in Information Security)
The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business...
Enabling Technologies for Mobile Services: The MobiLife Book
Enabling Technologies for Mobile Services: The MobiLife Book
This book’s emphasis is on describing a complete architectural framework, which combines theory and practice in a way that gives a realistic view of the opportunities and challenges in the applications and services area, including results from both extensive user evaluations and technical evaluations. It will cover topics in the B3G area that...
Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy