Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Juniper MX Series
Juniper MX Series

Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection,...

Handbook of Power System Engineering
Handbook of Power System Engineering

Maintaining the reliable and efficient generation, transmission and distribution of electrical power is of the utmost importance in a world where electricity is the inevitable means of energy acquisition, transportation, and utilization, and the principle mode of communicating media. Our modern society is entirely dependent on electricity, so...

Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

IBM Xseries 455 Planning And Installation Guide
IBM Xseries 455 Planning And Installation Guide
The IBM eServer xSeries 455 is the second-generation Enterprise X-Architecture server using the 64-bit IBM XA-64 chipset and the Intel Itanium 2 processor. Unlike the x450, its predecessor, the x455 supports the merging of four server chassis to form a single 16-way image, providing even greater expandability and investment protection.
...
Living Together: A Legal Guide for Unmarried Couples (13th Edition)
Living Together: A Legal Guide for Unmarried Couples (13th Edition)
Living together out of wedlock can mean anything, especially in court -- unlike married couples, most unmarried couples don't automatically inherit or receive protection under the law. Consequently, you must document everything from property ownership and children to wills and other estate plans.

An essential resource for any unmarried couple,...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
The availability of increased computational power and the proliferation of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information. As a result, the problem of copyright protection has attracted the interest of the worldwide scientific and business communities. The most...
Multimedia Security Handbook
Multimedia Security Handbook
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. The Multimedia Security Handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection...
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student...
Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Every company needs to protect its people and other assets by managing risk in the hiring process!

Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be
...
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Handbook of Digital Homecare (Series in Biomedical Engineering)
Handbook of Digital Homecare (Series in Biomedical Engineering)

Digital Homecare is a collection of services to deliver, maintain and improve care in the home environment using the latest ICT technology and devices.

It is important to recognize the wide range of issues that are covered by digital homecare. This book shows a good selection of related issues, be it experience, technologies, managerial...

Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy