Active Rules in Database Systems (Monographs in Computer Science)
A timely survey of the field from the point of view of some of the subject's most active researchers. Divided into several parts organized by theme, the book first covers the underlying methodology regarding active rules, followed by formal specification, rule analysis, performance analysis, and support tools. It then moves on to the... Windows NT SNMP
As communications networks grow in size and complexity, it becomes increasingly difficult to locally manage and control all of the devices (e.g., routers, servers, and workstations) on those networks. SNMP (Simple Network Management Protocol) gives you a way to manage network devices remotely. You can use SNMP to check on the...
OSPF Network Design Solutions
Network routing protocols have emerged as key enabling technologies in a computing world now dominated by connectivity. From a very high-level perspective, these routing protocols can be split into interior gateway protocols (IGPs) and exterior gateway protocols (EGPs). In general, the routing techniques used by IGPs are based on either...
Java Programming: Introductory This book does not assume prior programming experience and introduces object-oriented techniques early and explores them extensively.
This book distinguishes itself from other Java titles in that it does not assume prior programming experience and introduces object-oriented techniques early and explores them extensively. The book is...
Virtual Private Networks, 2nd Edition (O'Reilly Nutshell) This book explains how to build a Virtual Private Network (VPN), a collection of
technologies that creates secure collections or "tunnels" over regular Internet lines. It
discusses costs, configuration, and how to install and use technologies that are available for
Windows NT and UNIX, such as PPTP and L2TP, Altavista...
|Result Page: Previous 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Next |