Home | Amazing | Today | Tags | Publishers | Years | Search 
Protected Mode Software Architecture (PC System Architecture Series)
Protected Mode Software Architecture (PC System Architecture Series)

Protected Mode Software Architecture helps readers understandthe problems that single-task and multitasking operating systems must dealwith, and then examines each component of both the real and protected modesoftware architectures. This book is organized into three parts. Part One:Background introduces the reader to the problems faced...

Microsoft SQL Server 7 Data Warehousing Training Kit: McSe Training for Exam 70-019
Microsoft SQL Server 7 Data Warehousing Training Kit: McSe Training for Exam 70-019
The MICROSOFT(R) SQL SERVER(R) 7 DATA WAREHOUSING TRAINING KIT prepares students for MCP Exam 70-019-Designing and Implementing Data Warehouses with Microsoft SQL Server 7.0 and Microsoft(R) Decision Support Services 1.0. The Kit covers the installation, configuration, and support of the Microsoft SQL Server client/server database management...
Developing WMI Solutions: A Guide to Windows Management Instrumentation
Developing WMI Solutions: A Guide to Windows Management Instrumentation

"Craig and Gwyn bring their insight and experience with WMI to explain how easy it is to write powerful management applications through WMI on the .NET platform."

—Andy Cheung, Microsoft WMI Test Engineer

Windows Management Instrumentation (WMI) is an impressive technology that provides, for the first time, an...

The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services, Second Editionbuilds on the success of the previous best-selling edition, providing comprehensive coverage of IMS – its concepts, architecture, protocols and functionalities with a wealth of new and updated material. Mobile telephony with the current technology has been hugely...
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification 2nd Edition
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification 2nd Edition
Developments in RFID (Radio-Frequency Identification) are yielding larger memory capacities, wider reading ranges and quicker processing, making it one of fastest growing sectors of the radio technology industry.

RFID has become indispensable in a wide range of automated data capture and identification applications, from ticketing and access...

How to Design Programs: An Introduction to Programming and Computing
How to Design Programs: An Introduction to Programming and Computing
This introduction to programming places computer science in the core of a liberal arts education. Unlike other introductory books, it focuses on the program design process. This approach fosters a variety of skills--critical reading, analytical thinking, creative synthesis, and attention to detail - that are important for everyone, not just future...
Oracle Database 10g OCP Certification All-In-One Exam Guide (Oracle Database 10g Handbook)
Oracle Database 10g OCP Certification All-In-One Exam Guide (Oracle Database 10g Handbook)

The Most Authoritative OCA/OCP Exam Guide Available

Prepare to pass the OCA and OCP Oracle Database 10g certification exams with help from this Oracle Press guide. With complete coverage of all the material on Exam #1Z0-042 Oracle Database 10g: Administration I and Exam #1Z0-043 Oracle Database 10g: Administration II, this book covers...

IPv6 Essentials
IPv6 Essentials
IPv6, the next generation Internet Protocol, has been in the works since the early 90s when the rapid growth of the Internet threatened to exhaust existing IP addresses. Drawing on 20 years--operational experience with the existing protocol (IPv4), the new protocol offers scalability, increased security features, real-time traffic support, and...
Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Data Mining Cookbook: Modeling Data for Marketing, Risk and Customer Relationship Management
Data Mining Cookbook: Modeling Data for Marketing, Risk and Customer Relationship Management
Get a data mining recipe for success to increase profits and reduce costs in today’s business world with–This book shows you how to create and implement models of the most commonly asked data mining questions for marketing, sales, risk analysis, and customer relationship management and support. You’ll get proven modeling...
Designing Microsoft(r) ASP.NET Applications
Designing Microsoft(r) ASP.NET Applications
When I look down, I miss all the good stuff.
And when I look up, I just trip over things.
—Ani DiFranco

When I first heard about ASP.NET at a Microsoft author’s conference over a year ago, I
thought it might just be too good to be true. I can now create Web pages that are based
on compiled code, in one of
...
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)

MCSA/MCSE 70-291 Exam Cram, Second Edition is the #1 quick-study guide to passing the MCSA/MCSE 70-291 exam. This book covers all exam objectives, including how to maintain a DHCP server, manage name resolution with DNS, secure networks using IPSec, troubleshoot network and Internet connectivity, and monitor network...

Result Page: 312 311 310 309 308 307 306 305 304 303 302 301 300 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy