Home | Amazing | Today | Tags | Publishers | Years | Search 
Professional Microsoft SQL Server 2008 Administration (Wrox Programmer to Programmer)
Professional Microsoft SQL Server 2008 Administration (Wrox Programmer to Programmer)
Loaded with unique tips, tricks and workarounds for handling the most difficult SQL Server admin issues, Professional Microsoft SQL Server 2008 Administration is a how-to guide for experienced DBAs. Understand how to manage and monitor the SQL Server, automated administration, security, change management, performance tuning, scaling and...
Wireless Security and Cryptography: Specifications and Implementations
Wireless Security and Cryptography: Specifications and Implementations
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which...
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Next Generation SSH2 Implementation: Securing Data in Motion
Next Generation SSH2 Implementation: Securing Data in Motion
The most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book
...
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business provides in plain English a no–nonsense approach to setting up all the features of the Cisco IOS for a small business using broadband technologies. This book explains how to use a Cisco router to setup cable modems, DSL and PPPoE, and explains how to configure NAT, Access Control Lists, Firewalls,...
CCNA Wireless Official Exam Certification Guide  (CCNA IUWNE 640-721)
CCNA Wireless Official Exam Certification Guide (CCNA IUWNE 640-721)
CCNA Wireless Official Exam Certification Guide
  • Master IUWNE 640-721 exam topics with the official study guide
  • Assess your knowledge with chapter-opening quizzes
  • Review key concepts with Exam Preparation Tasks
  • Practice with realistic exam questions on the CD-ROM
...
Distributed Source Coding
Distributed Source Coding

Everything a signal and image processing engineer needs to know about distributed source coding - theorems, practical algorithms for design and the latest applications.

The advent of wireless sensor technology and ad-hoc networks has made DSC a major field of interest. Edited and written by the leading players in the field,
...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Foundation ASP.NET for Flash
Foundation ASP.NET for Flash
ASP.NET 2.0 is the new version of Microsoft's groundbreaking server-side scripting language. There is currently a huge demand to integrate dynamic content into Flash websites and applications and, as a solid competitor to technologies such as JSP, PHP, and ColdFusion, ASP.NET is one of the most popular choices to achieve this.

Used in...

Xbox 360В For Dummies (For Dummies (Computer/Tech))
Xbox 360В For Dummies (For Dummies (Computer/Tech))
Microsoft's Xbox now accounts for 37 percent of the game console market, and the new Xbox 360 is due out for the 2005 holiday season, months before Sony's PlayStation 3. When gamers take the new Xbox home, however, they'll soon discover that it's more than a just a game machine-it's a full-fledged home media hub with more power than most PCs. This...
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
The marriage of computers and telecommunications, the integration of these technologies into a multimedia system of communication that has global reach, and the fact that they are available worldwide at low cost seems to be bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may...
Mastering Microsoft Exchange Server 2007 SP1
Mastering Microsoft Exchange Server 2007 SP1
Microsoft Exchange Server provides a reliable messaging system that protects against spam and viruses and allows for access to e-mail, voicemail, and calendars from a variety devices and any location. Fully updated for the latest release of Microsoft Exchange Server 2007 Service Pack 1 (SP1), this book offers a look at the significant improvements...
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy