Home | Amazing | Today | Tags | Publishers | Years | Search 
Internet Marketing: Strategy, Implementation and Practice (3rd Edition)
Internet Marketing: Strategy, Implementation and Practice (3rd Edition)
This book is a comprehensive guide to how organizations can use the internet to support their marketing activities and covers all aspects of Internet marketing - environment analysis, strategy development and implementation. Building on the successful and widely regarded first edition, this second edition has a completely revised structure and...
MCSE: Windows 2000 Network Infrastructure Design Study Guide
MCSE: Windows 2000 Network Infrastructure Design Study Guide

Here’s the book you need to prepare for Exam 70-221, Designing a Microsoft Windows 2000 Network Infrastructure:

  • Comprehensive and in-depth coverage of every exam objective
  • Practical information on designing a Windows 2000 network infrastructure...
MCSE: Windows 2000 Directory Services Design Study Guide
MCSE: Windows 2000 Directory Services Design Study Guide

Here’s the book you need to prepare for Exam 70-219, Designing a Microsoft Windows 2000 Directory Services Infrastructure:

  • In-depth coverage of every exam objective
  • Practical information on designing a Directory Services infrastructure
  • ...
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)

Here’s the book you need to prepare for Exam 1D0-470, CIW Security Professional. This Study Guide provides:

  • In-depth coverage of official exam objectives
  • Practical information on security concepts and practices
  • Hundreds of...
MCSE: Windows Directory Services Administration Study Guide (with CD-ROM)
MCSE: Windows Directory Services Administration Study Guide (with CD-ROM)

Here’s the book you need to prepare for Exam 70-217, Implementing and Administering a Microsoft Windows 2000 Directory Services Infrastructure. This study guide provides:

  • In-depth coverage of every exam objective--all the information you need
  • Practical...
The Zope Book (Landmark)
The Zope Book (Landmark)
The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope...
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

Mastering Microsoft SQL Server 2005
Mastering Microsoft SQL Server 2005

The Comprehensive Resource for SQL Server 2005 Administrators, Consultants, and Developers

Whether you're a systems administrator, database application developer, or IT consultant, you'll quickly ratchet up your knowledge of Microsoft SQL Server 2005 with this thorough and comprehensive guide. Light...

Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role-based access control (RBAC) promises to provide several benefits to organizations. These benefits include simplified security provisioning and administration, ease of reporting on privileges and to whom they are available, and finer grained security authorization. By being policy-neutral, RBAC can be used to enforce the variety of access...
Ubuntu Certified Professional Study Guide (Exam LPI 199) (Book & CD Rom)
Ubuntu Certified Professional Study Guide (Exam LPI 199) (Book & CD Rom)
The Best Fully Integrated Study System Available for Exam LPI 199

With hundreds of practice questions and hands-on exercises, Ubuntu Certified Professional Study Guide covers what you need to know--and shows you how to prepare--for this challenging exam.

  • 100% complete coverage of all official...
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
Result Page: 603 602 601 600 599 598 597 596 595 594 593 592 591 590 589 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy