Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft ISA Server 2006 Unleashed
Microsoft ISA Server 2006 Unleashed
It is rare to run into that one product that impresses technical audiences in the way that ISA Server has managed to. As I prepared to write this book, what surprised me was not ISA’s ability to wow and charm Microsoft-centric environments, but its ability to impress the Microsoft-skeptic crowds as well. These are the ones who have been...
Capital Instincts: Life as an Entrepreneur, Financier, and Athlete
Capital Instincts: Life as an Entrepreneur, Financier, and Athlete

For over three decades, Thomas W. Weisel has been one of the leading figures of the financial scene that blossomed along with Silicon Valley, becoming an integral part of its phenomenal success. Many pioneers have contributed to the changing nature of U.S. business, but only a few have emerged as real leaders in American entrepreneurialism. Thom...

Microsoft Office Access 2003 Professional Results
Microsoft Office Access 2003 Professional Results
Become more productive right away using the hands-on directions and targeted information in this innovative how-to reference. Loaded with to-the-point techniques, this complete resource provides insightful answers to common questions as quickly as you can turn its pages. Use Access as a key data management tool. Design databases and program...
Windows Media 9 Series by Example
Windows Media 9 Series by Example
Videographers can harness the potential that WM9 offers to deliver high-quality video and multimedia via DVD and over the Internet. Illustrated examples and tutorials demonstrate the basic functionality of WM9 as well as the options available to advanced users who wish to design new applications with the software development kit. Professional...
Strategies for Managing Is/It Personnel
Strategies for Managing Is/It Personnel

As IT staff shortages are being experienced worldwide, with a huge gap between the number of positions available for IS/IT workers and the number of available qualified workers to fill them. The major factors that have contributed to the IS/IT crisis include lack of understanding of the career orientations of IS personnel; high IS staff...

Advances in Electronic Business, Volume I
Advances in Electronic Business, Volume I

Advances in Electronic Business, Volume 1 advances the understanding of management methods, information technology, and their joint applications in business processes. The applications of electronic commerce draw great attention from practitioners in applying digital technologies to the buy-and-sell activities. This first volume...

InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
FreeBSD Unleashed (With CD-ROM)
FreeBSD Unleashed (With CD-ROM)
Did you know that the special effects used in The Matrix were rendered using the FreeBSD system? Yahoo and the Internet Movie Database are also powered by FreeBSD. Now you can learn how to use FreeBSD to its full potential as well! FreeBSD Unleashed is a complete reference guide for FreeBSD administrators, developers, webmasters...
Using Moodle: Teaching with the Popular Open Source Course Management System
Using Moodle: Teaching with the Popular Open Source Course Management System
Using Moodle is a complete, hands-on guide for instructors learning how to use Moodle, the popular course management system (CMS) that enables remote web-based learning and supplements traditional classroom learning. Updated for the latest version, this new edition explains exactly how Moodle works by offering plenty of examples,...
How to Cheat at Deploying and Securing RFID
How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

For security
...
Home Theater For Dummies (Computer/Tech)
Home Theater For Dummies (Computer/Tech)

A low-tech way to understand a high-tech system!

Create the home entertainment center that fits your home and your tastes

Gadget fans, a home theater setup is the stuff your dreams are made of. This book keeps the dream from becoming a nightmare! Here's how to select, set up, and optimize a system, translate the salesperson's...

The 7 Essential Steps to Successful eBay Marketing
The 7 Essential Steps to Successful eBay Marketing
In this must-have book for eBay entreprenuers, eBay experts reveal how to reach the more than 100 million registered users and catapult your sales. Learn how to make listings stand out, inspire buyer confidence, close a sale, and keep customers coming back. An eBay University Instructor, a Fortune 100 marketing specialist, and an eBay PowerSeller...
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy