Home | Amazing | Today | Tags | Publishers | Years | Search 
Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
Sams Teach Yourself CSS in 24 Hours (2nd Edition)
Sams Teach Yourself CSS in 24 Hours (2nd Edition)

Learning to apply CSS is the HTML Web publisher's next developmental step toward a professional and stable Web design. A prerequisite to learning higherlevel languages like Javascript, Java, and Flash, CSS is gaining increasing support among major browsers, including Netscape, Internet Explorer (together 94% market share) and newcomers Opera,...

50 Fast Dreamweaver MX Techniques
50 Fast Dreamweaver MX Techniques
Using a simple, step-by-step format, this book shows you how to use Dreamweaver to create the most sophisticated, visually captivating designs that are possible on the Web today. From building dynamic tables to adding vivid Flash movies, you’ll uncover 50 fast and easy effects that you can achieve almost instantly with Dreamweaver MX. Each...
The Official New Features Guide to Sybase ASE 15
The Official New Features Guide to Sybase ASE 15
This book focuses on the many enhancements in Sybase ASE 15 including system administration enhancements, function-based indexes, computed columns, scrollable cursors, galaxy optimizer, query plan, galaxy partitions, multiple tempdb, MDA tables, andn Plan Viewer.

We’ve read the newsgroups. We’ve seen the blogs. We know
...
Effective Knowledge Transfer in Multinational Corporations
Effective Knowledge Transfer in Multinational Corporations
Those who have really enabled this research – and will, I hope, also benefit from its outcome at one point or other – are the managers who participated in the study. I hope my lengthy questionnaire and my numerous follow-up calls have not discouraged them to support further empirical studies. Special thanks go to my advisers, Professors...
Securing Windows 2000 Step by Step
Securing Windows 2000 Step by Step
This guide is the joint product of a community of Windows security managers and experts, who have voluntarily shared their experiences in this field so that others may benefit. The guide can be used to substantially improve the security of Windows 2000 computers and networks.

Just as Windows 2000 is the next evolution of Windows NT 4.0,
...
Basic Mathematics for Economists
Basic Mathematics for Economists
Economics students will welcome the new edition of this excellent textbook. Given that many students come into economics courses without having studied mathematics for a number of years, this clearly written book will help to develop quantitative skills in even the least numerate student up to the required level for a general Economics or Business...
Building Cisco Remote Access Networks
Building Cisco Remote Access Networks
Citrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's...
How to Cheat at Windows System Administration Using Command Line Scripts
How to Cheat at Windows System Administration Using Command Line Scripts
If you want to streamline the administration of your Windows servers and workstations by using command line scripts, this is the book for you! With every new version of Windows, Microsoft attempts to ease administrative tasks by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these...
Progress on Cryptography: 25 Years of Cryptography in China
Progress on Cryptography: 25 Years of Cryptography in China
This workshop entitled “Progress on Cryptography: 25 Year of Cryptography in China” is being held during the celebration of Professor Guozhen Xiao’s 70th birthday. This proceeding is a birthday gift from all of his current and former graduate students, who have had the pleasure of being supervised by Professor Xiao during the last...
The Atomic Corporation: Rational Proposals for Uncertain Times
The Atomic Corporation: Rational Proposals for Uncertain Times

In Atomic the authors' revolutionary theory is put to the test. Looking across all sectors of business, including retail banking, financial services, telecommunications, IT and consultancy, carbon-based corporations (oil and gas companies), and consumer products companies, Camrass and Farncombe discover some real eye-openers, including...

Result Page: 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 295 294 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy