 |
|
|
 Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this... |  |  The Complete IS-IS Routing Protocol
IS-IS has always been my favourite Interior Gateway Protocol. Its elegant simplicity, its
well-structured data formats, its flexibility and easy extensibility are all appealing – IS-IS
epitomizes link-state routing. Whether for this reason or others, IS-IS is the IGP of choice
in some of the world’s largest networks.... |  |  PeopleSoft for the Oracle DBA
This book is aimed at helping Oracle DBAs understand and use PeopleSoft technology. For the typical DBA, the introduction to PeopleSoft is likely to include some surprises, not all of them agreeable. Many—if not most—DBAs have to deal with many different databases, usually supporting different applications. Often they will want to... |
|
|
|
| Result Page: 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217 216 215 214 213 |