 |
|
|
|
 Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  |  |  TcL Scripting for Cisco IOS (Networking Technology)
A guide to building and modifying Tcl scripts to automate network administration tasks
Streamline Cisco network administration and save time with Tcl scripting
Cisco networking professionals are under relentless pressure to... |
|
 packetC Programming
This book covers a vast array of information related to packetC. It is a complete language reference and contains background information on many unique parts of packetC. As packetC shares much of its grammar with C, the book focuses on being an instructional language reference and not a general C programming introduction, since extensive... |  |  Digital Video Broadcasting: Technology, Standards, and Regulations
Many books and articles on the transition of television from analog to
digital transmission have been published in recent years. This transition
is still in its infancy, but it will inevitably take place in the years to
come. Due to digitization, the existing barriers between audio, video, and
data generation and transmission... |  |  Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole
new level. Whether you’re in the IT department, a systems integrator, a business
leader, or an end user, Fusion Applications has more of what you need, less of
what you don’t, and some of what you didn’t even think possible.
... |
|
| Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 |