Home | Amazing | Today | Tags | Publishers | Years | Search 
Developing International Software, Second Edition
Developing International Software, Second Edition

I completed work on the first edition of Developing International Software in December of 1994. Eight years later, I still receive scattered e-mail with questions about running or developing world-ready software, which I usually forward to the very capable World-Ready Guides (WRG) team (who are also responsible for the Dr....

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Building a Virtual Library
Building a Virtual Library
The organization, functioning, and the role of libraries in university communities continue to change dramatically. While academic research libraries continue to acquire information, organize it, make it available, and preserve it, the critical issues for their management teams in the twenty-first century are to formulate a clear mission and role...
Brain Mapping: The Methods, Second Edition (Toga, Brain Mapping)
Brain Mapping: The Methods, Second Edition (Toga, Brain Mapping)

Investigation of the functional architecture of the human brain using modern noninvasive imaging techniques is a rapidly expanding area of research. A proper knowledge of methodology is needed to appreciate the burgeoning literature in the field. This timely publication provides an excellent catalogue of the main techniques.

...

Administering and Securing the Apache Server
Administering and Securing the Apache Server

Apache is the most popular Web server in the world, hosting 50 percent of all Web sites! With Apache, you will get excellent performance at a low cost. The server, plus all of its source code, is freely available and you can modify it to your specific needs. With this book, you will learn how to install, configure, and troubleshoot the Apache...

Microsoft .NET Framework Security (One Off)
Microsoft .NET Framework Security (One Off)

Today, computing is dynamic and global. It is no longer practical to input or access data from a single computer. Microsoft .NET Framework allows you to use the same data for various digital devices. However, accessibility can lead to breaches in security. Therefore, this platform also provides several mechanisms for administrators and...

CCNP Switching Study Guide (2nd Edition; Exam 640-604 with CD-ROM)
CCNP Switching Study Guide (2nd Edition; Exam 640-604 with CD-ROM)
Here's the book you need to prepare for Cisco's new Switching exam, 640-604. Written by Cisco internetworking experts who can help you master the skills and acquire the knowledge needed to approach the test with confidence, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official exam...

10 Cool LEGO Mindstorms Robotics Invention System 2 Projects: Amazing Projects You Can Build in Under an Hour
10 Cool LEGO Mindstorms Robotics Invention System 2 Projects: Amazing Projects You Can Build in Under an Hour

LEGO MINDSTORMS lets you design and program robots that can do just about anything!
The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS users, that lets users design and program working robots - limited only by their imagination. Initially designed for users 12 and up, LEGO MINDSTORMS has taken off with LEGO enthusiasts of
...

Building Open Source Network Security Tools: Components and Techniques
Building Open Source Network Security Tools: Components and Techniques

Although open source network security tools come in all shapes and sizes, a company will eventually discover that these tools are lacking in some area—whether it’s additional functionality, a specific feature, or a narrower scope. Written by security expert Mike Schiffman, this comprehensive book will show you how to build your own...

Building PDA Databases for Wireless and Mobile Development
Building PDA Databases for Wireless and Mobile Development
Learn how to build databases on personal digital devices to be used with PDA applications

Several years ago, the business community accepted the Internet as a viable solution to extending the corporate environment. Today, there is another movement towards enhancing this methodology–– empowering mobile wireless business users with...

Juniper Networks Field Guide and Reference
Juniper Networks Field Guide and Reference

Juniper Networks® creates and deploys high-performance routing platforms used by many of the world's largest service providers. Written by the leading experts and technical writers at Juniper Networks, the Juniper Networks® Field Guide and Reference is the definitive practical guide and reference to Juniper...

Advanced CISSP Prep Guide: Exam Q & A
Advanced CISSP Prep Guide: Exam Q & A

Get ready to pass the CISSP exam and earn your certification with this advanced test guide

Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers,...

Result Page: Previous 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy