Home | Amazing | Today | Tags | Publishers | Years | Search 
Passive Optical Networks: Principles and Practice
Passive Optical Networks: Principles and Practice
The advent of video-on-demand and interactive gaming has prompted the deployment of broadband infrastructures. Because of its large bandwidth, Passive Optical Networks (PONs) are seen as the technology to make this happen. However, there are numerous standards and technologies - EPON, BPON, GPON, APON, WDM-PON, TDM-PON - which network providers and...
Oracle PL/SQL Language Pocket Reference
Oracle PL/SQL Language Pocket Reference
The fourth edition of this popular pocket guide provides quick-reference information that will help you use Oracle's PL/SQL language, including the newest Oracle Database 11g features. It's a companion to Steven Feuerstein and Bill Pribyl's bestselling Oracle PL/SQL Programming.

This concise guide boils down the most vital
...
Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China
Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007.

The 38 revised full papers presented were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on authentication and...

The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
Implementing ITIL Configuration Management
Implementing ITIL Configuration Management
Practical, Real-World ITIL Configuration Management–From Start to Finish

 

The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively,...

The Best Damn Exchange, SQL and IIS Book Period
The Best Damn Exchange, SQL and IIS Book Period
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support...
Advanced Software Engineering: Expanding the Frontiers of Software Technology
Advanced Software Engineering: Expanding the Frontiers of Software Technology
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

AdvancED Flex Application Development: Building Rich Media X
AdvancED Flex Application Development: Building Rich Media X
Many Flex books cover the basics—this book does something different, and goes far further. The authors, leading Flash platform developers at Almer/Blank, working with Adobe User Group communities, are the creators of the Rich Media Exchange (RMX), a social media network for Adobe developers. In covering just how the RMX was built, this book...
The Web Resource Space Model (Web Information Systems Engineering and Internet Technologies Book Series)
The Web Resource Space Model (Web Information Systems Engineering and Internet Technologies Book Series)
Classifying objects into categories at different granularity levels, establishing links between known objects, and discovering clues between known and unknown objects are essential for new-generation semantic data models. This book introduces the Resource Space Model (RSM), which effectively organizes and correctly manages resources by normalizing...
Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Application Vulnerabilities: Detect, Exploit, Prevent
This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,...
The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to...
Result Page: 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy