Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
"It is easy to write books that address broad topics and ideas leaving the reader with the question Yes, but how? By combining a comprehensive guide to data preparation for data mining along with specific examples in SAS, Mamdouh's book is a rare finda blend of theory and the practical at the same time. As anyone who has mined data will...
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Visual Basic and COM+ Programming by Example
Visual Basic and COM+ Programming by Example
A hands-on resource combining Visual Basic programming with COM+ programming. In addition to learning Visual Basic, readers learn how to administer COM+ components and provide security. They also learn how COM+ can be used to solve problems of Enterprise Application Integration.

(InformIT) A guide to learning program Visual Basic and COM+...

GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
"This is a strong author team and they have produced a much-needed and timely book"
--Bruce Davie, Cisco Fellow

"GMPLS technology provides a keystone for next generation integrated optical networks, and this book is the one-stop reference on the subject."
--Kireeti Kompella, Juniper Networks and CCAMP
...
Nmap in the Enterprise: Your Guide to Network Scanning
Nmap in the Enterprise: Your Guide to Network Scanning
Richard Stiennon, vice president at Gartner
"Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."

A
...
The Real MCTS/MCITP Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions
The Real MCTS/MCITP Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions
Independent and unbiased self-paced study with fully integrated book, practice exams, and e-learning modules.

This exam is designed to validate Windows Server 2008 Active Directory skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640.

The Microsoft Certified
...
ITIL Version 3 at a Glance: Information Quick Reference
ITIL Version 3 at a Glance: Information Quick Reference
ITIL® Version 3 At a Glance takes a graphical approach to consolidating the information of ITIL® version 3. ITIL® is an internationally-recognized set of best practices for providing IT service management. IT organizations worldwide are implementing ITIL® as a vehicle for improving IT service quality and improve...
Mastering Active Directory for Windows Server 2008
Mastering Active Directory for Windows Server 2008
Detailed Coverage of Active Directory for Windows Server 2008, 2003, 2003 R2, and 2000

If you are responsible for the day-to-day operations of Active Directory, you need this book. From Windows Server 2000 up through the new features available in Windows Server 2008, this comprehensive guide gives you the practical...

MPLS: Next Steps, Volume 1 (The Morgan Kaufmann Series in Networking)
MPLS: Next Steps, Volume 1 (The Morgan Kaufmann Series in Networking)
Multiprotocol Label Switching (MPLS) is a data plane and control technology that is used in packet (that is Internet Protocol) networks. Now over ten years old, it has taken root firmly as a fundamental tool in many service provider networks. The last ten years have seen a considerable consolidation of MPLS techniques and protocols. This has...
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with...
Information Science
Information Science
From cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains...
Windows Home Server Users Guide (Expert's Voice)
Windows Home Server Users Guide (Expert's Voice)
If you’re searching for a practical and comprehensive guide to installing, configuring, and troubleshooting Microsofts Windows Home Server, look no further. Inside Windows Home Server User’s Guide, you’ll learn how to install, configure, and use Windows Home Server and understand how to connect to and manage different...
Result Page: 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy