 |
|
|
|
 Managing and Securing a Cisco SWANWireless networking is all about freedom. Freedom is a worthy goal in its own right, and freedom in an organizational context pays dividends.
It’s tremendously cool to be able to sit down in an office or conference room, open your portable computer, and have instant connectivity to the resources you need to do your job.With... |  |  Security Assessment: Case Studies for Implementing the NSA IAMThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... |  |  Software Piracy ExposedThis book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software... |
|
 The Best Travel Writing 2010: True Stories from Around the World
My favorite mountaineering book is The Mountains of My Life, by legendary Italian climber Walter Bonatti. While I love being in the mountains—it’s a rare day I don’t daydream about the Alps or the Himalayas—I am not a climber. It isn’t so much Bonatti’s exploits that inspire me as his attitude towards... |  |  SQR in PeopleSoft and Other Applications Second Edition: PeopleSoft v.8SQR in PeopleSoft and Other Applications fills a big gap in the enterprise computing marketplace. For starters, this book explains (beginning from near zero) how to program with Structured Query Report Writer (SQR). It discusses the peculiarities of writing SQR software to interact with PeopleSoft databases. Readers are shown how to... |  |  XDoclet in Action (In Action series)A guide to the new XDoclet development tool that eliminates programming busy work by automatically generating code and other deployment artifacts, this book enables developers who place metadata in a single source code file to use XDoclet to generate additional source code and other files that are required in a project. Both smaller code... |
|
Result Page: Previous 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 Next |