Home | Amazing | Today | Tags | Publishers | Years | Search 
SSL Remote Access VPNs (Networking Technology: Security)
SSL Remote Access VPNs (Networking Technology: Security)
This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,...
RibbonX For Dummies (Computer/Tech)
RibbonX For Dummies (Computer/Tech)
Includes coding examples and sample conversion programs!

Create VBA, VB.NET, and C# custom applications with this radical new interface

Are you ready to tackle RibbonX? This friendly, plain-English guide gives you the tips and techniques you need to design and implement Ribbon...

Windows Server 2008 Hyper-V Unleashed
Windows Server 2008 Hyper-V Unleashed
Hyper-V is Microsoft’s server virtualization technology built-in to Windows Server 2008.  Virtual Machine Manager 2008 is a System Center add-on that helps organizations better manage their virtual guest images, delegate administration and management, and even extract virtual images from existing physical and virtual servers.  This...
The End of Software: Transforming Your Business for the On Demand Future
The End of Software: Transforming Your Business for the On Demand Future
Twenty-five years ago, the high-tech business was small, computers were largely relegated to accounting, and the money major corporations spent on information technology barely made a dent in their overall budgets. Today that has all changed. High-tech businesses are some of the largest in the world. The Dow Jones Industrial Average includes four...
Peachtree for Dummies
Peachtree for Dummies

Handle the financial parts of your business like a pro

Set up Peachtree to do what you need, and even have a backup plan

If you have a business, you have financial management needs. With Peachtreeand this book, you can manage inventory, bill customers and collect money, pay...

Numerical Geometry of Non-Rigid Shapes (Monographs in Computer Science)
Numerical Geometry of Non-Rigid Shapes (Monographs in Computer Science)
Deformable objects are ubiquitous in the world surrounding us, on all levels from micro to macro. The need to study such shapes and model their behavior arises in a wide spectrum of applications, ranging from medicine to security. In recent years, non-rigid shapes have attracted growing interest, which has led to rapid development of the field,...
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
This serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:

  • Shows you how to speed it up, lock it down, or pull back the curtains.
  • Dives into default system settings,...
Solaris 10 System Administration Exam Prep: CX-310-200, Part I (2nd Edition)
Solaris 10 System Administration Exam Prep: CX-310-200, Part I (2nd Edition)
In This Book You’ll Learn How To:
  • Install and configure the Solaris 10 operating environment on SPARC and x86/x64-based platforms
  • Set up, manage, back up, and recover file systems
  • Execute System Boot and Shutdown Procedures for SPARC and x86/x64-based systems
  • Manage services using the...
Understanding Forensic Digital Imaging
Understanding Forensic Digital Imaging
The science of digital imaging can be divided into two separate branches: the techniques that explain how to use and create digital images, and the technical knowledge that is necessary to design cameras, computers, and software. The expert witness should be a skilled practitioner in the techniques and have enough understanding of the technical...
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Mark Weisers vision of computers moving out of our focus of attention and becoming oblivious devices that occur in large numbers and provide smart computing und communication services to individuals as needed is still far from being reality.

This book puts the larger vision of ubiquitous computing in the context of todays mobile and distributed...

Building the E-Service Society: E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing)
Building the E-Service Society: E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing)
Building the E-Service Society is a state-of-the-art book which deals with innovative trends in communication systems, information processing, and security and trust in electronic commerce, electronic business, and electronic government. It comprises the proceedings of I3E2004, the Fourth International Conference on E-Commerce,...
Programming in C (Hayden Books C Library)
Programming in C (Hayden Books C Library)
A complete introduction to the C programming language! This bestseller provides comprehensive coverage of the C language.
  • Includes language features and over 90 program examples
  • Gives step-by-step explanations for all functions
  • Explains program looping, decision-making, arrays, functions, and...
Result Page: 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy