|
|
|
|
|
|
Solaris 9 Network Administration Exam Cram 2 (Exam Cram CX-310-044)This cram sheet contains the distilled, key facts about the Solaris 9 Network Administrator exam. Review this information just before you enter the testing center, paying special attention to those areas where you feel that you need the most review. You can transfer any of these facts from your head onto a blank sheet of paper immediately before... | | PC Hacks : 100 Industrial-Strength Tips &ToolsCovering both Windows and Linux, PC Hacks combines the bestselling Hacks series style with the world's most popular computing hardware. Hacks for enhancing performance and preventing problems with your PC include overclocking CPU and video cards, tweaking RAM timing, selecting the best performing components,... | | Queueing Theory with Applications to Packet TelecommunicationSoon after Samuel Morse’s telegraphing device led to a deployed electrical telecommunications system in 1843, waiting lines began to form by those wanting to use the system. At this writing queueing is still a significant factor in designing and operating communications services, whether they are provided over the Internet... |
|
Enterprise Resource Planning: Global Opportunities and ChallengesHow can ERP be used to improve the overall organizational operating efficiency and effectiveness? How is ERP going to evolve in the future and what are the implications for Electronic commerce? The overall objective of Enterprise Resource Planning: Global Opportunities and Challenges is to provide students, academicians and practitioners interested... | | Mission Critical Windows 2000 Server AdministrationTo put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows... | | OS X for Hackers at Heart: The Apple of Every Hacker's EyeThe sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research... |
|
|
Result Page: 188 187 186 185 184 183 182 181 180 179 |