Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Storage Networking: Real World Skills for the CompTIA Storage+ Certification and Beyond
Data Storage Networking: Real World Skills for the CompTIA Storage+ Certification and Beyond

Learn efficient ways to harness and manage your data storage networks

Whether you're preparing for the CompTIA Storage+ exam or simply seeking a deeper understanding of data storage networks, this Sybex guide will help you get there. This book covers data storage from the basics to advanced topics, and provides practical...

International Economics: Theory and Policy (International Edition)
International Economics: Theory and Policy (International Edition)
At the start of the twenty-first century, international aspects of economics remain as important and controversial as ever. In the last decade alone, major currency and Financial crises have rocked industrializing countries from East Asia to Latin America; countries in Europe have given up their national currencies in favor of a common currency,...
Protecting Games: A Security Handbook for Game Developers and Publishers
Protecting Games: A Security Handbook for Game Developers and Publishers

This book is intended to infect its readers with an interest and concern for game protection. My goal is not to preach to the ”security converted,” but to convince game designers, developers, programmers, managers, marketeers, and artists that they should care about the security of their games and give them confidence that there are...

Intellectual Property: The Law of Trademarks, Copyrights, Patents, and Trade Secrets for the Paralegal
Intellectual Property: The Law of Trademarks, Copyrights, Patents, and Trade Secrets for the Paralegal

The field of intellectual property (typically referred to as IP) is one that continues its rapid growth. Just a few years ago, individuals who identifi ed themselves as practitioners in the fi eld of intellectual property were met with blank stares. Now IP professionals are in constant demand, and it is a rare issue of any legal newspaper...

Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...

Radiological Protection (Landolt-Börnstein: Numerical Data and Functional Relationships in Science and Technology - New Series)
Radiological Protection (Landolt-Börnstein: Numerical Data and Functional Relationships in Science and Technology - New Series)

The volume Radiological Protection is not only a compilation of numerical data and functional relationships for practical purposes. Rather a comprehensive accompanying text is intended to impart to the scientific or professional user of Radiological Protection both data, the concepts and scientific bases of...

Programming with Managed Extensions for Microsoft Visual C++ .NET
Programming with Managed Extensions for Microsoft Visual C++ .NET

The most immediately obvious feature of .NET is the runtime, which Microsoft calls the common language runtime. The concept of a runtime is not new to Microsoft technologies—Visual Basic applications have always carried around the baggage of the Visual Basic runtime, and Microsoft’s foray into Java brought about the...

Industrial Power Engineering Handbook (Newnes Power Engineering Series)
Industrial Power Engineering Handbook (Newnes Power Engineering Series)
Never before has so much ground been covered in a single volume reference source. This five-part work is sure to be of great value to students, technicians and practicing engineers as well as equipment designers and manufacturers, and should become their one-stop shop for all information needs in this subject area.

This book will be of
...
Data Protection
Data Protection
At first sight, Data Protection may not appear to affect the library professional unduly. The 1998 Data Protection Act only applies to information about people. Most of the material held in a typical library will not be covered.

But this first impression would be wrong. Librarians deal with people every day. They hold information about
...
Firewall Policies and VPN Configurations
Firewall Policies and VPN Configurations
Deploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will...
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
Multimedia Forensics and Security
Multimedia Forensics and Security
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,...
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy