Home | Amazing | Today | Tags | Publishers | Years | Search 
CCNP ONT Official Exam Certification Guide
CCNP ONT Official Exam Certification Guide
CCNP ONT Official Exam Certification Guide is an excellent self-study resource for the 642-845 ONT exam. Passing the exam certifies that the successful candidate has important knowledge and skills in optimizing and providing effective QoS techniques for converged networks. Passing the exam is one of the requirements for the Cisco Certified Network...
Photoshop Elements 5 Workflow: The Digital Photographer's Guide
Photoshop Elements 5 Workflow: The Digital Photographer's Guide
Whether you’re new to Photoshop Elements or an experienced image editor, this professional book shows you how to create consistent high-quality images by establishing a logical sequence of essential tasks. From sorting images and RAW conversion to advanced editing and output, it’s all here in the friendly, professional style that...
Professional Apache Tomcat 6 (WROX Professional Guides)
Professional Apache Tomcat 6 (WROX Professional Guides)
With this comprehensive resource, you'll uncover the ins-and-outs of installing, configuring, and running the Apache Tomcat server. This book not only provides a line-by-line analysis of configuration options, but also explores the features and capabilities of Tomcat. You'll then gain the skills to solve the type of problems that arise during all...
RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302) (Certification Press)
RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302) (Certification Press)

The Best Fully Integrated Study System Available

With hundreds of practice questions and hands-on exercises, RHCE Red Hat Certified Engineer Linux Study Guide, Fifth Edition covers what you need to know--and shows you how to prepare--for this challenging exam.

  • 100% complete coverage of all objectives for...
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
Digital Crime And Forensic Science in Cyberspace
Digital Crime And Forensic Science in Cyberspace
itself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has...
PC Magazine Windows Vista Security Solutions
PC Magazine Windows Vista Security Solutions
When you want to defend Windows Vista,it's good to know a PC Magazine expert

Unless a time machine just dropped you in the 21st century, you already know that protecting your computer is essential. Now, here's Vista—new enough that no one is sure exactly what security threats might arise to hijack your...

Windows Vista: The Complete Reference (Complete Reference Series)
Windows Vista: The Complete Reference (Complete Reference Series)

Take full advantage of the high-performance features available in Microsoft Windows Vista and experience the power of this integrated, next-generation operating system. Windows Vista: The Complete Reference shows you how to install and configure Windows Vista for optimal performance, customize the streamlined new desktop, display...

Hierarchical Bayesian Optimization Algorithm: Toward a New Generation of Evolutionary Algorithms
Hierarchical Bayesian Optimization Algorithm: Toward a New Generation of Evolutionary Algorithms

This book provides a framework for the design of competent optimization techniques by combining advanced evolutionary algorithms with state-of-the-art machine learning techniques. The primary focus of the book is on two algorithms that replace traditional variation operators of evolutionary algorithms, by learning and sampling Bayesian networks:...

The E-Privacy Imperative : Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age
The E-Privacy Imperative : Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age
With their potential for vicious customer backlash and devastating sales drops, Internet privacy infractions--such as selling e-mail lists and personal data or operating an insecure site where credit-card or competitive-pricing information can be stolen--have become deadly serious business concerns.

The E-Privacy Imperative is...

Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills
Develop the skills you need in the real world

Hit the ground running with the street-smart training you'll find in this practical book. Using a "year in the life" approach, it gives you an inside look at the common responsibilities of security administrators, with key information organized around the actual...

The Complete FreeBSD, Fourth Edition
The Complete FreeBSD, Fourth Edition

FreeBSD is by far the most popular version of BSDВ®, the legendary operating system that has contributed a great deal to every version of UnixВ® in use today (including Mac OSВ® X). Originally a community effort by the University of California at Berkeley, FreeBSD was aimed at making Unix a little friendlier and easier to...

Result Page: 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy