Home | Amazing | Today | Tags | Publishers | Years | Search 
Technology Matters: Questions to Live With
Technology Matters: Questions to Live With

Winner, 2009 Sally Hacker Prize given by the Society for the History of Technology (SHOT). and Choice Outstanding Academic Title, 2006

Technology matters, writes David Nye, because it is inseparable from being human. We have used tools for more than 100,000 years, and their central purpose has not always been to
...

Essential SharePoint 2010: Overview, Governance, and Planning
Essential SharePoint 2010: Overview, Governance, and Planning

The Only Book That’s Completely Focused on Maximizing the Business Value of SharePoint 2010 Solutions

 

Essential SharePoint® 2010 approaches Microsoft SharePoint Server 2010 from a strict business value perspective,...

Developing Real World Software
Developing Real World Software

Ideal for use in a software engineering lab or special topics setting, Developing Real World Software is a practical guide for developing useful, real world software applications that are high performing, secure, reliable, and configurable. It expands upon material presented in traditional software engineering texts and focuses on key...

Fixed Mobile Convergence Handbook
Fixed Mobile Convergence Handbook

Requirements for next generation networks (NGNs) are fueling an architectural evolution. Service providers are obliged to give users access to content anytime, anyhow, anywhere, on any device. This requires a converged infrastructure in which users across multiple domains can be served through a single unified domain and all network services...

Building Websites with ExpressionEngine 2
Building Websites with ExpressionEngine 2

ExpressionEngine is a flexible, feature-rich content management system used by top designers and web professionals across the world to build and manage their websites. It is written in the world's most popular web scripting language, PHP, and built on the MySQL database server. Are you eager to start creating websites with...

802.11 Security
802.11 Security

802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent...

Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step...

CCNA Certification All-In-One For Dummies
CCNA Certification All-In-One For Dummies

A complete preparation guide for the entry-level networking CCNA certification

If you're planning to advance your career by taking the all-important Cisco Certified Network Associate (CCNA), this is the study guide you need! Seven minibooks cover all the concepts and topics on which you'll be tested, covering the latest...

Debugging Linux Systems
Debugging Linux Systems

Debugging Linux Systems discusses the main tools available today to debug 2.6 Linux Kernels. We start by exploring the seemingly esoteric operations of the Kernel Debugger (KDB), Kernel GNU DeBugger (KGDB), the plain GNU DeBugger (GDB), and JTAG debuggers. We then investigate Kernel Probes, a feature that lets you intrude into a kernel...

Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Well-known security experts decipher the most challenging aspect of cloud computing-security

Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access...

World of Warcraft Programming: A Guide and Reference for Creating WoW Addons
World of Warcraft Programming: A Guide and Reference for Creating WoW Addons

The #1 bestselling programming book is back with updated and expanded coverage of the newest release of WoW!

World of Warcraft (WoW) is currently the world's largest massively multiplayer online role-playing game. The newest release, "Wrath of the Lich King," has created a demand for updated information on writing...

Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

Result Page: 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy