Home | Amazing | Today | Tags | Publishers | Years | Search 
Hitting the Wall: A Vision of a Secure Energy Future (Synthesis Lectures on Energy and the Environment: Technology, Science, and Society)
Hitting the Wall: A Vision of a Secure Energy Future (Synthesis Lectures on Energy and the Environment: Technology, Science, and Society)
Hitting the Wall examines the combination of two intractable energy problems of our age: the peaking of global oil production and the overloading of the atmosphere with greenhouse gases. Both emerge from the overconsumption of fossil fuels and solving one problem helps solve the other. The misinformation campaign about climate change is discussed...
Pharmacology Demystified
Pharmacology Demystified
Just the prescription for mastering pharmacology! .

Looking forward to locking in a great, secure job in the booming healthcare field? Well, before you can graduate and get your license, you have to pass that challenging compulsory course in pharmacology. Luckily, there's no need to be intimidated or confused. In...

GFI Network Security and PCI Compliance Power Tools
GFI Network Security and PCI Compliance Power Tools
Use GFI's Tools to Search for Vulnerabilities in Your Network!

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.
...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
SAS 9.1.3 Language Reference: Dictionary, 3-Volume Set
SAS 9.1.3 Language Reference: Dictionary, 3-Volume Set
New and enhanced features in Base SAS save you time, effort, and system resources by providing faster processing and easier data access and management, more robust analysis, and improved data presentation.
  •  By using new SAS system options that enable threading and the use of multiple CPUs, the following SAS procedures take...
Oracle Enterprise Manager 10g Grid Control Implementation Guide (Osborne ORACLE Press Series)
Oracle Enterprise Manager 10g Grid Control Implementation Guide (Osborne ORACLE Press Series)

Install and Configure Grid Control to Manage Your Oracle Landscape

Build a robust grid computing infrastructure with guidance from an Oracle expert who developed and taught the Grid Control Deep Dive class to Oracle Consulting. Featuring real-world examples and best practices, Oracle...

JD Edwards EnterpriseOne: The Complete Reference (Osborne ORACLE Press Series)
JD Edwards EnterpriseOne: The Complete Reference (Osborne ORACLE Press Series)
Your definitive guide to JD Edwards EnterpriseOne

Implement and maintain a fully integrated, SOA-based ERP framework across your entire corporation. JD Edwards EnterpriseOne: The Complete Reference explains how to install and administer JD Edwards EnterpriseOne, store BI information in data marts and warehouses, manage...

Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business provides in plain English a no–nonsense approach to setting up all the features of the Cisco IOS for a small business using broadband technologies. This book explains how to use a Cisco router to setup cable modems, DSL and PPPoE, and explains how to configure NAT, Access Control Lists, Firewalls,...
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer....

Wireless Security and Cryptography: Specifications and Implementations
Wireless Security and Cryptography: Specifications and Implementations
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which...
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
PC QUICKSTEPS 2/E
PC QUICKSTEPS 2/E

Learn instantly from step-by-step graphics!

We know a picture is worth a thousand words--so we went heavy on pictures and light on words in this easy-to-use guide. Color screenshots and brief instructions show you how to manage, customize, and troubleshoot your desktop or laptop PC. Follow along and learn to install and configure...

Result Page: 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy