Home | Amazing | Today | Tags | Publishers | Years | Search 
Advances in Computers, Volume 61: Architectural Issues
Advances in Computers, Volume 61: Architectural Issues
Emphasizes architectural issues in the design of new hardware and software system.

The series covers new developments in computer technology. Most chapters present an overview of a current subfield within computer science, with many citations, and often include new developments in the field by the authors of the individual
...
IT Service Management Guide: Vol. 1
IT Service Management Guide: Vol. 1
The importance of IT Service Management is becoming widely recognized. Whereas in the 1960s and 1970s interest was still focused mainly on the improvement of hardware, and whereas the development of software was the major concern until well into the 1980s, the 1990s was the decade that saw the rise of service management.

For decades,
...
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

BusinessObjects XI Release 2 For Dummies (Computer/Tech)
BusinessObjects XI Release 2 For Dummies (Computer/Tech)

Make better decisions with help from BusinessObjects

Find your way around Universes and see how your organization is doing

BusinessObjects may seem like a dauntingly complex topic, but this book makes it a snap. Even if you're new to business intelligence tools, you'll find it's...

Making an Impact Online (Business on a Shoestring)
Making an Impact Online (Business on a Shoestring)
'A brand new series aimed at small businesses, with another four volumes to come later in the year. These cover different subjects to most series and they look great. Ideas, examples, tips and sources of further information add up to a great little package in each.' The Bookseller (March 2007) 'All in all this is an excellent introduction for...
The Unofficial Guide to Windows Vista
The Unofficial Guide to Windows Vista
The inside scoop...for when you want more than the official line!

Microsoft Vista may be the hot new operating system, but to use it with confidence, you'll need to know its quirks and shortcuts. Find out what the manual doesn't always tell you in this insider's guide to using Vista in the real world. How can you customize...

IP Multimedia Subsystem (IMS) Handbook
IP Multimedia Subsystem (IMS) Handbook
The IP multimedia subsystem (IMS), established as the foundation for future wireless and wireline convergence, is the bedrock that will facilitate easy deployment on new, rich, personalized multimedia communication services that mix telecom and data services. Designers, planners, and researchers of communication systems will need to make full use...
Open Source Systems Security Certification
Open Source Systems Security Certification
Open Source Advances in Computer Applications book series provides timely technological and business information for:

Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies;

Inserting OSS in the critical path of complex network development and embedded...

Hacking Cyberspace
Hacking Cyberspace
In Hacking Cyberspace David J. Gunkel examines the metaphors applied to new technologies, and how those metaphors inform, shape, and drive the implementation of the technology in question. The author explores the metaphorical tropes that have been employed to describe and evaluate recent advances in computer technology, telecommunications...
Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy