Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Security Management Handbook, Sixth Edition (Isc2 Press)
Information Security Management Handbook, Sixth Edition (Isc2 Press)
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion...
Active and Programmable Networks for Adaptive Architectures and Services
Active and Programmable Networks for Adaptive Architectures and Services
New applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,...
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony service has been standardized in 3GPP as the replacement of the circuit switched telephony service in cellular networks. The multimedia telephony service consists of several service components such as voice, video and text. ‘IMS Multimedia Telephony over Cellular Systems’ provides a comprehensive overview of the...
Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

Network Protocols Handbook
Network Protocols Handbook
We are living in the IT(Information Technologies) times. The IT provides us many powerful tools that have significantly changed our way of life, work and business operations. Among all the IT advancements, Internet has the most impact in every aspect of our society for the past 20 years. From Internet, people can get instant news, communicate with...
Novell's Guide to Troubleshooting eDirectory (Novell Press)
Novell's Guide to Troubleshooting eDirectory (Novell Press)
Novell eDirectory (formerly Novell Directory Services- NDS) is employed by system administrator to define users on the network and links those same users to their access rights with corporate resources, devices like printers and security policies. Novell eDirectory is comparable to Microsoft's Active Directory and is designed for large-scale,...
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)

Learn how to employ JADE to build multi-agent systems!

JADE (Java Agent DEvelopment framework) is a middleware for the development of applications, both in the mobile and fixed environment, based on the Peer-to-Peer intelligent autonomous agent approach. JADE enables developers to implement and...

Mac OS X Server 10.4 Tiger: Visual QuickPro Guide
Mac OS X Server 10.4 Tiger: Visual QuickPro Guide
Offering Apple's legendary ease of use plus everything you would expect from a Unix-based operating system--preemptive multitasking, symmetric multiprocessing, and support for networking and security standards--Mac OS X Server has revolutionized the world of network administration. Mac OS X Tiger server continues that tradition by offering more...
How the Internet Works (8th Edition)
How the Internet Works (8th Edition)
Have you ever wanted to know how data travels from computer to computer, around the world? Have you ever wondered how Web sites can track users or how newsgroups work? How the Internet Works shows you how with easy-to-follow, four-color visual spreads tracking the path data flows and the hardware involved. Now entering its fourth year, How the...
IT Project Management Handbook
IT Project Management Handbook
Now you can manage IT projects quickly, easily, on time, and on budget!

IT project management has developed into a complex process with a broader scope of responsibilities than ever before. Here is the newest and most comprehensive book to offer winning insights and strategies on how to manage every step of the process. Written by two of this...

Network Management Fundamentals
Network Management Fundamentals
Network management is an essential factor in successfully operating a network. As a company becomes increasingly dependent on networking services, keeping those services running is synonymous with keeping the business running. Network Management Fundamentals provides you with an accessible overview of network management covering management not just...
MCSE Upgrade to Microsoft Windows 2000: Training Kit (It-Training Kit)
MCSE Upgrade to Microsoft Windows 2000: Training Kit (It-Training Kit)

Welcome to Upgrading to Microsoft Windows 2000 Training Kit. This kit introduces you to the Windows 2000 family of products, prepares you to install the Windows 2000 software, and prepares you to upgrade your Microsoft Windows NT 4.0 network to a Windows 2000 network.

This kit concentrates on Windows 2000 Server and on...

Result Page: 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy