 |
|
 |  |  Beginning OpenOffice 3: From Novice to ProfessionalOffice suites are one of the most popular types of software, and most computer users will, at some point, find themselves staring at the user interface of a word processor, spreadsheet, or presentation package. Traditionally, office suites have been quite expensive packages, but thanks to the generosity of Sun Microsystems and a massive community... |  |  Encyclopedia of Multimedia Technology and NetworkingMultimedia technology and networking are changing at a remarkable rate. Despite the telecoms crash of 2001, innovation in networking applications, technologies, and services has continued unabated. The exponential growth of the Internet, the explosion of mobile communications, the rapid emergence of electronic commerce, the restructuring of... |
|
 SAP Security Configuration and Deployment: The IT Administrator's Guide to Best PracticesThe user's guide to best practices in improving and enhancing security in a SAP landscape.
Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and... |  |  Next Generation SSH2 Implementation: Securing Data in MotionThe most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book... |  |  Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable AssetsInside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive... |
|
 Mobile Malware Attacks and DefenseThe Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new... |  |  Atoms, Radiation, and Radiation Protection (Physics Textbook)Since the preparation of the second edition (1995) of Atoms, Radiation, and Radiation Protection, many important developments have taken place that affect the profession of radiological health protection. The International Commission on Radiological Protection (ICRP) has issued new documents in a number of areas that are addressed in this third... |  |  |
|
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |