|
|
|
|
|
|
|
Hacking a Terror Network: The Silent Threat of Covert ChannelsFrom a counterterrorism perspective, discovering terrorist communication networks and methods is extremely important.Terrorists have demonstrated the capability to exchange messages that vary from archaic (using human couriers) to technologically advanced using “virtual dead-drops.”The popular press is full of... | | Managing RAID on Linux"Finally, the book contains a good index and a brief appendix giving links to other sources. A very useful volume that should find favour with anyone who wishes to implement RAID on a Linux system." - Steve Boniwell, HP/Works
Redundant Array of Independent Disks (RAID) technology is becoming a standard feature of... | | Sucessful Presentation Skills (3rd edition)
A good presentation involves effective communication and essential for business success. From training new employees to building rapport with potential clients, the ability to deliver information is a required skill. This guide addresses the common problems people face - overcoming nerves, handling visual aids, and shaping the presentation... |
|
|
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 |