 |
|
 Forensic Computer Crime InvestigationThe Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest... |  |  |  |  Software Engineering Quality Practices (Applied Software Engineering)Learn how to attract and keep successful software professionals Software Engineering Quality Practices describes how software engineers and the managers that supervise them can develop quality software in an effective, efficient, and professional manner. This volume conveys practical advice quickly and clearly while avoiding the dogma that... |
|
 Deploying LINUX on the DesktopCovering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!
Looking at the world of the... |  |  Open Source Web Site Construction KitGives readers a comprehensive survey of the best tools for building and maintaining Web sites. Author takes the reader through the process of thinking through and then building an open source Web site. Softcover.
This book gives readers a comprehensive survey of the best tools for building and maintaining Web sites. In a... |  |  Maximum Apache Security (Maximum Security)The Maximum Security series, which debuted in 1997, has thus far enjoyed relative success. I use the term “relative success,” because security title sales have historically trickled, rather than gushed. For altering this and fostering a new market, Sams editors deserve kudos. Their insights have proven providential: Today, Maximum... |
|
 |  |  The Physics of SuperheroesIf superheroes stepped off the comic book page or silver screen and into reality, could they actually work their wonders in a world constrained by the laws of physics? How strong would Superman have to be to “leap tall buildings in a single bound”? Could Storm of the X-Men possibly control the weather? And how many cheeseburgers would... |  |  |
|
 Protocol Management in Computer NetworkingPresents a novel management framework, referred to as the Measurement-Estimation-SchedulingActuation (or MESA) model. This is not a book about network management...but rather a book about management in networking. DLC: Computer network protocols.
This book presents a novel management framework, which I refer to as the... |  |  Interoperability of Enterprise Software and ApplicationsInteroperability: the ability of a system or a product to work with other systems or products without special effort from the user is a key issue in manufacturing and industrial enterprise generally. It is fundamental to the production of goods and services quickly and at low cost at the same time as maintaining levels of quality and customisation.... |  |  101 Ways to Promote Your Tourism Business Web Site (101 Ways series)Full of practical, proven techniques and step-by-step strategies, this informative resource teaches internet tourism businesses how to attract visitors and convert them into paying customers. With a design that allows each chapter to stand on its own, the book provides easy and immediate implementation... |
|
Result Page: 1066 1065 1064 1063 1062 1061 1060 1059 1058 1057 1056 1055 1054 1053 1052 1051 1050 1049 1048 |