|
|
|
|
| | Information Security Policies and Actions in Modern Integrated SystemsInformation Security Policies and Actions in Modern Integrated Systems is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data,... | | Hack Proofing Sun Solaris 8Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors... |
|
TcL Scripting for Cisco IOS (Networking Technology)
A guide to building and modifying Tcl scripts to automate network administration tasks
Streamline Cisco network administration and save time with Tcl scripting
Cisco networking professionals are under relentless pressure to... | | Virtualization Security: Protecting Virtualized Environments
Securing virtual environments for VMware, Citrix, and Microsoft hypervisors
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,... | | The Economic and Social Impacts of E-CommerceE-commerce is not new, though the interest shown in it is of relatively recent origin. Academics have applied their skill in seeking to maintain or improve business efficiency for years past, but they have concerned themselves mainly with obtaining facts of a historical nature – that is, by analyzing past papers, they have sought to... |
|
|
Debating the Reagan Presidency (Debating Twentieth-Century America)The presidency of Ronald Reagan has become a Rorschach Test for politicians and citizens alike. Conservatives see the Reagan era as the high-water mark for their movement, in much the same way that many progressives view FDR's presidency as the pinnacle of liberalism. Liberals maintain that the rosy Reagan legacy is based largely on myth, and... | | Microsoft SQL Server 2008 High Availability
Every new version of SQL Server brings with it new tools and features for database administrators (DBAs), developers, and architects, for them to be able to provide an effective solution for the end users in a simpler and more efficient manner. The terms effective and efficiency can be measured in a technical perspective as High Availability... | | Road User Charging and Electronic Toll Collection
As highways, crossing points, and urban streets become increasingly jammed with traffic, more and more roadway authorities are turning to electronic tolling and pricing to manage traffic and road usage. This authoritative book offers professionals expert guidance in planning, procuring, and operating electronic tolling and road-user charging... |
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 |