 |
|
 The Multimedia Handbook (Blueprint Series)Multimedia has become a very large and diverse field of activity. Its fuzzy boundaries merge into Information Technology. Disk storage, creative aspects like authoring, transmission protocols, standards, politics, and networks called superhighways are examples of activities where technical matters, creative work, applications, politics, and... |  |  |  |  Grid Computing: The Savvy Manager's Guide (The Savvy Manager's Guides)"This book explains grid in simple terms, using practical examples to demonstrate the technical and business benefits of grid and providing hands-on guidance for readers. This is a must read for everyone who is seriously investigating grid or planning to integrate grid technology in their IT environment." --Wolfgang Gentzsch,... |
|
 Maximum Windows 2000 Security (Maximum Security)Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.
Topics include:
Physical & File System Security,
Password Security,
Malicious Code,
Windows 2000 Network Security Architecture and Professional... |  |  Special Edition Using SOAPThis book will introduce the reader to SOAP and serve as a comprehensive reference to both experienced and new developers in the area. Only one other book completely dedicated to SOAP is currently on the market, and it has strong sales because no other information is available. SE Using SOAP will capture more readers than the competition because it... |  |  Cisco Voice over IP (CVOICE) (Authorized Self-Study Guide) (3rd Edition)Cisco Voice over IP (CVOICE), Third Edition, is a Cisco-authorized, self-paced learning tool for CCVP foundation learning. This book provides you with the knowledge and skills required to plan, design, and deploy a Cisco voice-over-IP (VoIP) network and to integrate gateways and gatekeepers into an enterprise VoIP network. By reading this... |
|
 Mastering Mac OS X, Third EditionCovers OS X v.10.3, Panther!
On the Prowl for In-Depth, Step-by-Step, Mac OS X Coverage? Your Search Is Over
Whether you're new to the Mac, upgrading from a previous Mac OS version, or converting from Windows or Unix, Mastering Mac OS X, Third Edition is your one-stop resource for... |  |  Programming .NET 3.5 .NET 3.5 will help you create better Windows applications, build Web Services that are more powerful, implement new Workflow projects and dramatically enhance the user's experience. But it does so with what appears to be a collection of disparate technologies. In Programming .NET 3.5, bestselling... |  |  Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit"I think this book will be the first standard introductory book on mobile agents." José M. Vidal, University of South Carolina Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are... |
|
 Agent Communication II: International Workshops on Agent Communication, AC 2005 and AC 2006, Utrecht, Netherlands, July 25, 2005, and Hakodate, JapanThis book constitutes the thoroughly refereed post-proceedings of the two International Workshops on Agent Communication, AC 2005 and AC 2006, held in Utrecht, Netherlands in July 2005, and in Hakodate, Japan in May 2006 as associated events of AAMAS 2005/2006, the main international conference on autonomous agents and multi-agent systems.
The... |  |  Linux Security (Networking)This book provides you with comprehensive knowledge about Linux Security. The book is aimed at readers who are familiar with Linux concepts but now want to gain a solid foundation in Linux security features. It is assumed these readers already understand some Linux and networking concepts, such as network protocols, network servers, and so on. This... |  |  |
|
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 |