 |
|
 Advances in Computers, Volume 61: Architectural IssuesEmphasizes architectural issues in the design of new hardware and software system.
The series covers new developments in computer technology. Most chapters present an overview of a current subfield within computer science, with many citations, and often include new developments in the field by the authors of the individual... |  |  IT Service Management Guide: Vol. 1The importance of IT Service Management is becoming widely recognized. Whereas in the 1960s and 1970s interest was still focused mainly on the improvement of hardware, and whereas the development of software was the major concern until well into the 1980s, the 1990s was the decade that saw the rise of service management.
For decades,... |  |  Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware DevicesNagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of... |
|
 2600: The Hacker Quarterly, Summer 20022600: The Hacker Quarterly, Summer 2002:
2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as... |  |  Cellular Authentication for Mobile and Internet ServicesAn invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and integration into existing networks
Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure... |  |  BusinessObjects XI Release 2 For Dummies (Computer/Tech)Make better decisions with help from BusinessObjects
Find your way around Universes and see how your organization is doing
BusinessObjects may seem like a dauntingly complex topic, but this book makes it a snap. Even if you're new to business intelligence tools, you'll find it's... |
|
 Making an Impact Online (Business on a Shoestring)'A brand new series aimed at small businesses, with another four volumes to come later in the year. These cover different subjects to most series and they look great. Ideas, examples, tips and sources of further information add up to a great little package in each.' The Bookseller (March 2007) 'All in all this is an excellent introduction for... |  |  The Unofficial Guide to Windows VistaThe inside scoop...for when you want more than the official line!
Microsoft Vista may be the hot new operating system, but to use it with confidence, you'll need to know its quirks and shortcuts. Find out what the manual doesn't always tell you in this insider's guide to using Vista in the real world. How can you customize... |  |  IP Multimedia Subsystem (IMS) HandbookThe IP multimedia subsystem (IMS), established as the foundation for future wireless and wireline convergence, is the bedrock that will facilitate easy deployment on new, rich, personalized multimedia communication services that mix telecom and data services. Designers, planners, and researchers of communication systems will need to make full use... |
|
 Open Source Systems Security CertificationOpen Source Advances in Computer Applications book series provides timely technological and business information for:
Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies;
Inserting OSS in the critical path of complex network development and embedded... |  |  Hacking CyberspaceIn Hacking Cyberspace David J. Gunkel examines the metaphors applied to new technologies, and how those metaphors inform, shape, and drive the implementation of the technology in question. The author explores the metaphorical tropes that have been employed to describe and evaluate recent advances in computer technology, telecommunications... |  |  Architecting Secure Software SystemsThrough the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they... |
|
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 |