 |
|
 Drupal 6 Social NetworkingBuild a social or community web site, with friends lists, groups, custom user profiles, and much more
- Step-by-step instructions for putting together a social networking site with Drupal 6
- Customize your Drupal installation with modules and themes to match the needs of almost any social networking site
... |  |  E-Mail: Communicate Effectively (NetEffect Series)This easy-to-read, in-depth book contains comprehensive information and expert advice on communicating effectively and responsibly through e-mail. It provides readers with learning activities, tools, and tips to help them actually change behaviors and learn this critical workplace skill. Five chapters cover a variety of e-mail topics: saving... |  |  Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)Tony Redmond does it again! He provides detailed real-world information that will make you an expert on Exchange 2003. This book is a clear, to-the-point source of information filled with sound practical advice. Whether you're new to Exchange or upgrading your existing Exchange systems, this detailed guide can help you tap all the power,... |
|
 Physical Security for IT"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each... |  |  |  |  |
|
 Antiviral Drug Discovery for Emerging Diseases and Bioterrorism ThreatsPromising drug discovery efforts in the race to cure emerging diseases and thwart bioterrorism
It was not too long ago that scientists believed that the discovery of powerful antimicrobial agents and vaccines would lead to the eradication of viral diseases. A warning, however, of the looming threat of viral diseases on U.S. national security... |  |  Hacker AttackHacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You'll be fascinated as you read about hackers, crackers and whackers--people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or... |  |  Windows Home Server For Dummies (Computer/Tech)If you work in an office, you probably don’t lose much sleep worrying about whether your files are safe if your PC melts down. Company IT departments handle those things for business networks. But how about all those precious photos, address lists, the family genealogy, and everything else that lives on your home network? Windows Home Server... |
|
 How to Cheat at Securing LinuxLinux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased... |  |  Bulletproofing TCP/IP Based Windows NT/2000 NetworksFind out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of... |  |  Perioperative Transfusion MedicineThoroughly updated for its Second Edition, this volume is the most comprehensive, current reference on perioperative transfusion medicine and coagulation. It provides complete information on all current blood products and transfusion risks, transfusion and coagulation issues during the preoperative, intraoperative, and postoperative periods, and... |
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 |