Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows 7 Inside Out, Deluxe Edition
Windows 7 Inside Out, Deluxe Edition

By some measures, Windows 7 sets a new standard for usability. It needs less out-of-the-box tweaking and troubleshooting than any Windows version we’ve ever used. The arrangement of folders and files in Windows Explorer, basic system security, User Account Control settings, and numerous other default configuration options are...

Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications
Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications

Architect IBM® WebSphere® Applications for Maximum Performance, Security, Flexibility, Usability, and Value Successful, high-value WebSphere applications begin with effective architecture. Now, one of IBM’s leading WebSphere and WebSphere Portal architects offers a hands-on,...

How to Measure Anything: Finding the Value of Intangibles in Business
How to Measure Anything: Finding the Value of Intangibles in Business

Anything can be measured. This bold assertion is the key to solving many problems in business and life in general. The myth that certain things can't be measured is a significant drain on our nation's economy, public welfare, the environment, and even national security. In fact, the chances are good that some part of your life...

Advanced .NET Remoting (C# Edition)
Advanced .NET Remoting (C# Edition)

This text presents a detailed discussion of deployment options (using XML), and is followed by a quick discussion of security and authentication and then managing object lifetimes.

  • Targets two audiences: the “use-it” developers and the “understand-and-extend-it” developers
  • Includes...
C# Programmer's Cookbook
C# Programmer's Cookbook

Next time you hit the wall with a tough C# development problem, get the code behind the solution—and solve it the right way. The C# Programmer’s Cookbook provides at-a-glance reference to hundreds of C# and Microsoft .NET Framework programming scenarios using a concise, problem/solution format. The book’s organized so...

CISSP Exam Cram 2
CISSP Exam Cram 2

Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam Cram 2 is a great way to find out exactly what will be expected of you during...

Microsoft  Windows Server(TM) 2003 Inside Out
Microsoft Windows Server(TM) 2003 Inside Out
Take your Windows Server 2003 knowledge to the next level! Designed for Windows system administrators, this definitive resource delivers in-depth information about installing and configuring Windows Server 2003, performing upgrades and migrations, automating deployments, implementing security features, managing software updates and patches,...
Auditor's Guide to Information Systems Auditing
Auditor's Guide to Information Systems Auditing

Praise for Auditor′s Guide to Information Systems Auditing

"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what...

Microsoft Windows Vista Administration
Microsoft Windows Vista Administration
It was almost midnight, and the crowd’s excitement was palpable. The line had wrapped around the electronics store, getting longer with each passing hour. As the clock ticked closer to midnight, the pack grew more and more electric. In just a few minutes, it would be in their hands. Was the crowd waiting to buy a new CD? Was a new Star Wars...
Installing and Administering Linux, Second Edition
Installing and Administering Linux, Second Edition
An indispensable working resource for IT professionals moving to Linux-based network systems

More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand...

Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

unlimited object storage image
Result Page: 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy