Home | Amazing | Today | Tags | Publishers | Years | Search 
No Logo : Taking Aim at the Brand Bullies
No Logo : Taking Aim at the Brand Bullies
If I squint, tilt my head, and shut my left eye, all I can see out the window is 1932, straight down to the lake. Brown warehouses, oatmeal-colored smokestacks, faded signs painted on brick walls advertising long-discontinued brands: "Lovely," "Gaywear." This is the old industrial Toronto of garment factories, furriers and...
Using Microsoft Windows Small Business Server 2003
Using Microsoft Windows Small Business Server 2003
This is the fundamental, definitive reference to Microsoft Small Business Server 2003. And it is relevant for all audiences: for beginners just embracing the notion of computerizing their small businesses, to IT consultants specializing in SBS implementation and deployment.

The book focuses on pragmatic solutions, not drawn-out theoretical...

Windows Vista: Beyond the Manual
Windows Vista: Beyond the Manual
Windows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft client operating system on the market. It guides you through the complexities of configuring and running a successful Windows Vista client computer. It also takes an in-depth look at the wealth of features and...
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
Outlook 2007: Beyond the Manual
Outlook 2007: Beyond the Manual
Many people use Outlook either by choice or by force, but few of them do more than scratch the surface of the personal information manager's many features. And after years of spending hours each day within Outlook, most users become at least proficient with its base features.

Outlook 2007: Beyond the Manual takes you to the next level,...

Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments

Save time & resources with this comprehensive guide to automation configuration for the value-added IP services of the future.

As the Internet becomes the medium of choice for value-added IP service offerings such as TV broadcasting, videoconferencing, and Voice over IP, the ability of automating configuration...

Implementing 802.1X Security Solutions for Wired and Wireless Networks
Implementing 802.1X Security Solutions for Wired and Wireless Networks
When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
FreeRADIUS Beginner's Guide
FreeRADIUS Beginner's Guide

This is a fast-paced Beginner's Guide that will take you step by step through the fundamentals of FreeRADIUS and using it in your live projects. It has been structured in a way that will let you get maximum practical information out of it in setting up your own FreeRADIUS server. It will guide you on all the aspects of FreeRADIUS and do...

Beacon Technologies: The Hitchhiker's Guide to the Beacosystem
Beacon Technologies: The Hitchhiker's Guide to the Beacosystem

Learn the key standards―iBeacon, Eddystone, Bluetooth 4.0, and AltBeacon―and how they work with other proximity technologies. Then build your understanding of the proximity framework and how to identify and deploy the best solutions for your own business, institutional, or consulting needs.

Proximity technology―in...

Combinatorics, Automata and Number Theory (Encyclopedia of Mathematics and its Applications)
Combinatorics, Automata and Number Theory (Encyclopedia of Mathematics and its Applications)

This collaborative volume presents recent trends arising from the fruitful interaction between the themes of combinatorics on words, automata and formal language theory, and number theory. Presenting several important tools and concepts, the authors also reveal some of the exciting and important relationships that exist between these...

PPP Design, Implementation, and Debugging (2nd Edition)
PPP Design, Implementation, and Debugging (2nd Edition)
Extensively revised and expanded to cover the latest developments in PPP and network technology, this second edition addresses such current topics as:
  • PPP in today's telecommunications infrastructure
  • PPP and telephony
  • Optical (SONET/SDH) PPP links
  • The relationship between PPP and...
Result Page: 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy