 |
|
 Leading IT Projects: The IT Manager's GuideSenior level IT managers are responsible for a wide variety of development projects. For the most part, these individual projects are handled by project managers. However, IT managers must be conversant in the field of project management. Additionally, they must understand the dynamics of managing the project manager and be familiar with the skill... |  |  Malware Forensics: Investigating and Analyzing Malicious Code
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and... |  |  Bookkeeping Workbook For Dummies (Business & Personal Finance)If you're preparing for The American Institute of Professional Bookkeepers' (AIPB) bookkeeping certification test, you need an easy- to-follow test-preparation guide that gets you up to speed quickly in all of the bookkeeping basics, from setting up a company's books and recording transactions to managing employee payroll, handling government... |
|
|
 Networks: Design and ManagementNetworks are groups of computers that communicate by either cable or wireless transmissions. By the use of computer networking, we can share data with others. Today, all businesses, small or large use some type of computers and most use computer networking to handle their daily business operations such as bookkeeping, inventory tracking, document... |  |  Crime Mapping Case Studies: Practice and ResearchCrime Mapping Case Studies: From Research to Practice provides a series of key examples from practice and research that demonstrate applications of crime mapping and its effect in many areas of policing and crime reduction. This book brings together case studies that show how crime mapping can be used for analysis,... |  |  |
|
 Mobile Telemedicine: A Computing and Networking PerspectiveWireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has... |  |  SSL Remote Access VPNs (Networking Technology: Security)This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,... |  |  Wireless Security Essentials: Defending Mobile Systems from Data PiracyProtect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,... |
|
Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 |