|
|
Complete Book of Remote Access: Connectivity and Security (Best Practices)
As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how... | | CRC Handbook of Medicinal Spices"Let food be your medicine, medicine your food." -Hippocrates, 2400 B.C. When the "Father of Medicine" uttered those famous words, spices were as important for medicine, embalming, preserving food, and masking bad odors as they were for more mundane culinary matters. Author James A. Duke predicts that spices such as capsicum,... | | Securing and Controlling Cisco RoutersSecuring and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting... |
|
The Food Chemistry Laboratory: A Manual for Experimental Foods, Dietetics, and Food Scientists, Second EditionA popular book in its first edition, The Food Chemistry Laboratory: A Manual for Experimental Foods, Dietetics, and Food Scientists, Second Edition continues to provide students with practical knowledge of the fundamentals of designing, executing, and reporting the results of a research project. Presenting experiments that can be completed, in many... | | | | The ABCs of LDAPThis book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.
With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly... |
|
| | Building A Global Information Assurance ProgramGovernments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are... | | Software Engineering for Image Processing Systems (Image Processing Series)
This book is not intended to be a traditional software engineering text — there are
many good ones. Instead, it is designed specifically for those involved in image
processing systems. It provides a modern engineering framework for the specification,
design, coding, testing, and maintenance of image processing software and... |
|
| | Time-Domain Computer Analysis of Nonlinear Hybrid Systems"Easy to read, concise, and complete." -Alfy Riddle, IEEE Microwave Magazine
…Easy to read, concise, and complete. -Alfy Riddle, IEEE Microwave Magazine
The analysis of nonlinear hybrid electromagnetic systems poses significant challenges that essentially demand reliable numerical methods. In recent... | | |
|
Result Page: Previous 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 Next |