|
|
|
| | Administering Exchange 2000 ServerInstall, configure, and manage Microsoft's Exchange 2000 Server
Build, maintain, and troubleshoot a scaleable, reliable messaging infrastructure using Exchange 2000 Server. Logically organized into task-based sections, Administering Exchange 2000 Server explains how to manage sites, clients, address lists, and Internet protocols. The book also... | | Text Atlas of Podiatric Dermatology
For many years there has been a very positive link between podiatry and clinical dermatology, but unfortunately they largely
remain apart in most medical cultures, both in training and in practice. Where they have begun to overlap in the clinical
treatment of foot dermatological problems the benefits rapidly become obvious to those... |
|
How to Design Programs: An Introduction to Programming and ComputingThis introduction to programming places computer science in the core of a liberal arts education. Unlike other introductory books, it focuses on the program design process. This approach fosters a variety of skills--critical reading, analytical thinking, creative synthesis, and attention to detail - that are important for everyone, not just future... | | Dictionary of Internetworking Terms and AcronymsComprehensive reference resource for terms found everyday in the work of students, Cisco systems professionals, and others who use Cisco systems on a regular basis. Includes thorough coverage of recent technologies and updated definitions and acronyms for key
- Your portable reference of internetworking terms and definitions
... | | Java Enterprise Design Patterns: Patterns in Java Volume 3Use design patterns to develop real-world Java™ distributed and Enterprise applications
This third volume from Mark Grand features 38 design patterns for developing real-world Java distributed and enterprise applications. Some of the key concepts covered are reliable transaction processing, distributed objects, reliable message passing,... |
|
SSH, The Secure Shell: The Definitive GuideSecure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers,... | | Configuring ISA Server 2000Today's tools for connectivity are more sophisticated and flexible than ever. As a result, there are more variables involved in setting them up and making them all work together. Mission Critical ISA Server 2000 is designed to provide practical guidance to administrators at businesses that are going online. It teaches readers how to use the... | | Javascript Programmer's ReferenceThe book is aimed at people who already have some knowledge of JavaScript and need a companion volume to their daily work. It is primarily aimed at the experienced practitioner, and so does not attempt to be a tutorial for the beginner.
For a tutorial book, we suggest Paul Wilton's Beginning... |
|
Result Page: Previous 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Next |