|
|
|
|
Microsoft Outlook 2010 Inside Out
You're beyond the basics, so dive right in and take control of your schedule and business communications from the inside out! This in-depth reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds in a supremely organized format. It's all muscle and no fluff. Discover how the experts manage... | | Locksmith and Security Professionals' Exam Study GuideGet the Solid Preparation Needed to Pass Your Security Certification Exam on the First Try
Filled with career-building instruction and guidance, Locksmith and Security Professionals' Exam Study Guide is a hands-on learning tool that will help you pass a wide variety of... | | Practical Signcryption (Information Security and Cryptography)
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives... |
|
|
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's HypervisorHyper-V is one of the top virtualization products, and this practical guide focuses on the essentials of Windows Server 2008 Hyper-V. Written by the Microsoft team behind the Hyper-V product, this book shows you how to perform key virtualization scenarios, such as server consolidation, software test and development, and a dynamic data center and... | | The Definitive Guide to the ARM Cortex-M3This user's guide does far more than simply outline the ARM Cortex-M3 CPU features; it explains step-by-step how to program and implement the processor in real-world designs. It teaches readers how to utilize the complete and thumb instruction sets in order to obtain the best functionality, efficiency, and reuseability. The author, an ARM engineer... | | Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they... |
|
x86 Instruction Set Architecture
The Instruction Set Architecture, or ISA, is defined as that part of the processor architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO. With the exception of some small deviations and differences in... | | Sas 9.1 Language Reference ConceptsThis title comprehensively documents essential concepts for SAS features, the DATA step, and SAS files, including general BASE SAS concepts, BASE SAS DATA, BASE SAS file concepts, and much more.
Base SAS software enables you to bring all your data into a single system. This title comprehensively documents essential concepts for SAS... | | Information Protection Playbook (Risk Management Portfolio)
The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business... |
|
|
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 |