 |
|
|
|
 Using Moodle: Teaching with the Popular Open Source Course Management SystemUsing Moodle is a complete, hands-on guide for instructors learning how to use Moodle, the popular course management system (CMS) that enables remote web-based learning and supplements traditional classroom learning. Updated for the latest version, this new edition explains exactly how Moodle works by offering plenty of examples,... |  |  The Best Damn Firewall Book Period, Second EditionThe Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.
Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this... |  |  Integrated Formal Methods: 4th International Conference, IFM 2004, CanterburyThe fourth conference in the series of international meetings on Integrated Formal Methods, IFM, was held in Canterbury, UK, 4–7 April 2004. The conference was organized by the Computing Laboratory at the University of Kent, whose main campus is just outside the ancient town of Canterbury, part of the county of Kent.
Kent is... |
|
 |  |  Robohelp for the WebThis guide explains the use and administration of eHelp's latest software package, emphasizing administrator setup and maintenance.
Provides with an explanation of installing and configuring RoboHelp and presents an outline for creating a documentation plan. Softcover. CD-ROM included.
RoboHelp Enterprise is... |  |  Penetration Tester's Open Source Toolkit, Volume 2Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing... |
|
Result Page: 822 821 820 819 818 817 816 815 814 813 812 811 810 809 808 807 806 805 804 |