 |
|
 Passive Optical Networks: Principles and PracticeThe advent of video-on-demand and interactive gaming has prompted the deployment of broadband infrastructures. Because of its large bandwidth, Passive Optical Networks (PONs) are seen as the technology to make this happen. However, there are numerous standards and technologies - EPON, BPON, GPON, APON, WDM-PON, TDM-PON - which network providers and... |  |  Oracle PL/SQL Language Pocket ReferenceThe fourth edition of this popular pocket guide provides quick-reference information that will help you use Oracle's PL/SQL language, including the newest Oracle Database 11g features. It's a companion to Steven Feuerstein and Bill Pribyl's bestselling Oracle PL/SQL Programming. This concise guide boils down the most vital... |  |  |
|
 The Best Damn Firewall Book Period, Second EditionThe Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.
Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this... |  |  Implementing ITIL Configuration ManagementPractical, Real-World ITIL Configuration Management–From Start to Finish
The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively,... |  |  The Best Damn Exchange, SQL and IIS Book PeriodExchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support... |
|
 Advanced Software Engineering: Expanding the Frontiers of Software TechnologyThis volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has... |  |  CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)All-in-One is All You Need
Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains... |  |  AdvancED Flex Application Development: Building Rich Media XMany Flex books cover the basics—this book does something different, and goes far further. The authors, leading Flash platform developers at Almer/Blank, working with Adobe User Group communities, are the creators of the Rich Media Exchange (RMX), a social media network for Adobe developers. In covering just how the RMX was built, this book... |
|
 |  |  Web Application Vulnerabilities: Detect, Exploit, PreventThis book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,... |  |  |
|
Result Page: 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 |