Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Networking All-in-One Desk Reference For Dummies (Computer/Tech)
Networking All-in-One Desk Reference For Dummies (Computer/Tech)
Covers all Windows® XP service packs and Fedora Linux®

Your one-stop guide to building and managing a business or home network

Why take up a whole shelf with networking books when all the essentials are right here in one handy volume? Here's how to put a network together, choose the hardware and software, set up a server,...

E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Security for Wireless Sensor Networks (Advances in Information Security)
Security for Wireless Sensor Networks (Advances in Information Security)
From the reviews:

 

"Security for Wireless Sensor Networks provides a detailed overview of wireless sensor security issues, describing techniques for protecting networks and the results of recent studies in wireless sensor network security. Aimed at network security researchers and designers, this volume takes a high-level...

Trojans, Worms, and Spyware, First Edition : A Computer Security Professional's Guide to Malicious Code
Trojans, Worms, and Spyware, First Edition : A Computer Security Professional's Guide to Malicious Code
One of the biggest headaches that comes along with networked and Internetconnected
computers is the absolute requirement of dealing with malicious
code attacks. There is no choice; if your systems are not equipped in some way
with antivirus protection, sooner or later some bug will eat them. There is also
very little to be
...
Security in E-Learning (Advances in Information Security)
Security in E-Learning (Advances in Information Security)
As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk...
Business Continuity Planning for Data Centers and Systems: A Strategic Implementation Guide
Business Continuity Planning for Data Centers and Systems: A Strategic Implementation Guide

Praise for Business Continuity Planning for Data Centers and Systems: A Strategic Implementation Guide

"Continuity is a primary business driver. This timely book offers a refreshingly honest road map to informed decision making by one of the mission critical industry's foremost real estate experts....

Smart Packaging Technologies for Fast Moving Consumer Goods
Smart Packaging Technologies for Fast Moving Consumer Goods

Smart Packaging Technologies for Fast Moving Consumer Goods approaches the subject of smart packaging from an innovative, thematic perspective:

  • Part 1 looks at smart packaging technologies for food quality and safety
  • Part 2 addresses smart packaging issues for the supply chain
  • ...
Design Guide for Concrete-filled Double Skin Steel Tubular Structures
Design Guide for Concrete-filled Double Skin Steel Tubular Structures
The concrete-filled double skin steel tubular (CFDST) structure is a new type of steel-concrete composite structure. It inherits the advantages of conventional concrete-filled steel tubular (CFST) structures, including high strength, good ductility and durability, high fire resistance and favorable constructability....
Digital Identity
Digital Identity

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval...

MCTS Self-Paced Training Kit (Exam 70-642): Configuring Windows Server 2008 Network Infrastructure (PRO-Certification)
MCTS Self-Paced Training Kit (Exam 70-642): Configuring Windows Server 2008 Network Infrastructure (PRO-Certification)
Announcing an all-new Self-Paced Training Kit designed to help maximize your performance on 70-642, the required exam for the new Microsoft® Certified Technology Specialist (MCTS): Windows Server 2008 Networking Infrastructure Configuration certification. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on...
A Practical Guide to the Wiring Regulations
A Practical Guide to the Wiring Regulations

The Third Edition has been updated to take account of the 2001 amendments to the Wiring Regulations, including revisions on:

- protection against overcurrent

- isolation and switching

- zoning requirements for locations containing a bath or shower

- construction site installations

-...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy