Home | Amazing | Today | Tags | Publishers | Years | Search 
TcL Scripting for Cisco IOS (Networking Technology)
TcL Scripting for Cisco IOS (Networking Technology)

A guide to building and modifying Tcl scripts to automate network administration tasks

 

Streamline Cisco network administration and save time with Tcl scripting

Cisco networking professionals are under relentless pressure to...

Deflation: What Happens When Prices Fall
Deflation: What Happens When Prices Fall
MAY 6, 2003, WAS AN EXTRAORDINARY DAY IN Washington, D.C. The Federal Reserve held its Federal Open Market Committee (FOMC) meeting in its two-storied chandeliered boardroom at the central bank's white marble temple on Constitution Avenue. Now, there was nothing unusual about the FOMC gathering. The committee meets...
Bad Data Handbook: Cleaning Up The Data So You Can Get Back To Work
Bad Data Handbook: Cleaning Up The Data So You Can Get Back To Work

What is bad data? Some people consider it a technical phenomenon, like missing values or malformed records, but bad data includes a lot more. In this handbook, data expert Q. Ethan McCallum has gathered 19 colleagues from every corner of the data arena to reveal how they’ve recovered from nasty data problems.

From...

Courts and Trials: A Reference Handbook (Contemporary World Issues)
Courts and Trials: A Reference Handbook (Contemporary World Issues)

Courts are governmental institutions that serve important functions for society, including dispute processing, policymaking, and the enforcement of rules. Courts have a profound effect on people within their jurisdiction, especially individuals subjected to a civil lawsuit or a criminal prosecution. When legal cases...

Geographic Profiling
Geographic Profiling
Scientific criminology has its roots in crime mapping. The first great systematic studies of crime were cartographic exercises made possible by recordkeeping systems created to track criminal convictions in France and England during the early part of the 19th century. Compared with maps of demographic, economic, and social...
Microsoft SQL Server 2012 Performance Tuning Cookbook
Microsoft SQL Server 2012 Performance Tuning Cookbook
Microsoft SQL Server 2012 Performance Tuning Cookbook is divided into three major parts—Performance Monitoring, Performance Tuning, and Performance Management—that are mandatory for dealing with performance in any capacity.

Microsoft SQL Server 2012 Performance Tuning Cookbook offers a great way to manage
...
e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009.
e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009.
The present book includes extended and revised versions of a set of selected best papers from the 6th International Joint Conference on e-Business and Telecommunications (ICETE), which was held in July 2009, in Milan, Italy. This conference reflects a continuing effort to increase the dissemination of recent research results...
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Women in Biotechnology: Creating Interfaces
Women in Biotechnology: Creating Interfaces
Biotechnologies, such as genetic engineering, cloning and biodiversity, raise many legal and ethical concerns, so it is important that people understand these issues and feel able to express their opinions. This is why the European Commission has been, for a number of years, supporting actions to improve communication among...
Energy Supply and Renewable Resources
Energy Supply and Renewable Resources
One has only to read a newspaper or magazine to realize the importance of energy at this early juncture of the 21st century. It will surely become more critical as world demand for oil continues to increase and its supply peaks and begins to fall.

Industrialized nations have become addicted to an ever-increasing
...
Pro SharePoint 2010 Administration (Professional Apress)
Pro SharePoint 2010 Administration (Professional Apress)

Pro SharePoint 2010 Administration is a practical guide to SharePoint 2010 for intermediate to advanced SharePoint administrators and power users, covering the out-of-the-box feature set and capabilities of Microsoft's collaboration and business productivity platform.

SharePoint 2010 is an incredibly complex
...

Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy