Home | Amazing | Today | Tags | Publishers | Years | Search 
CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

Java Security Solutions
Java Security Solutions
Your complete guide to the what, why, where, and how of Java Security

In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...

Practical .NET 2.0 Networking Projects
Practical .NET 2.0 Networking Projects
Practical .NET 2.0 Networking Projects demonstrates some of the key networking technologies that are being made easily accessible through .NET Framework 2.0. It discusses communication between wired machines and between networks and mobile devices. The book teaches you about the technologies by walking you through sample projects in a...
Taxes 2007 For Dummies
Taxes 2007 For Dummies
Tax season doesn’t just have to be about paying Uncle Sam his due. Sure, giving up your hard-earned dollars hurts, but you can turn lemons into lemonade by turning knowledge into immediate and long-term tax savings. What’s more, wising up about your tax situation can only increase your financial savvy and bolster your future...
Linux Appliance Design: A Hands-On Guide to Building Linux Appliances
Linux Appliance Design: A Hands-On Guide to Building Linux Appliances
Linux appliances are computers that serve a single, well-defined purpose. Modern appliances are complex machines, with processors, operating systems, and application software. For example, the Tivo is essentially a Linux-based computer with a single purpose: recording television. While there are books that tell readers how to run Linux on embedded...
An Introduction to Distributed Algorithms
An Introduction to Distributed Algorithms
"Barbosa makes the otherwise difficult subject of distributed algorithms very enjoyable and attractive to both students and researchers. The leading intuitive discussion of each algorithm is so very well organized and clearly written that a reader can, without the slightest effort, have a clear picture of it. An ideal textbook for an...
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
Bioinformatics Technologies
Bioinformatics Technologies
Solving modern biological problems requires advanced computational methods. Bioinformatics evolved from the active interaction of two fast-developing disciplines, biology and information technology. The central issue of this emerging field is the transformation of often distributed and unstructured biological data into meaningful information....
Microsoft(r) Systems Management Server 2.0 Administrator's Companion
Microsoft(r) Systems Management Server 2.0 Administrator's Companion

Microsoft has traditionally geared its development of Microsoft BackOffice applications toward providing network administrators with tools that can facilitate the functionality and management of their Microsoft Windows NT networks. For example, applications such as Microsoft Exchange 5.5 and Microsoft SQL Server 7.0 provide exceptional mail...

Knowledge Mining: Proceedings of the NEMIS 2004 Final Conference
Knowledge Mining: Proceedings of the NEMIS 2004 Final Conference
This book contains the papers presented during the 3rd International Workshop on Text Mining and its Applications held in Athens, Greece. This workshop is the final event of the activities of a network of excellence in the area of text mining and its applications. Knowledge Mining includes contributions in the areas of: Document processing,...
Computer Security and Cryptography
Computer Security and Cryptography

Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Result Page: 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy