Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Server 2003 Security : A Technical Reference
Windows Server 2003 Security : A Technical Reference

This book is not designed with the Windows end user, advanced or not, in mind. It is meant for the server administrator, network administrator, security administrator, IT manager, technology specialist, or other individual who must design, implement, troubleshoot, or configure the security of Windows Server 2003 or the...

Grid Database Design
Grid Database Design
Computing has come a long way since our earliest beginnings. Many of
us have seen complete revisions of computing technology in our lifetimes.

I am not that old, and I have seen punch cards and Cray supercomputers,
numbered Basic on an Apple IIe, and highly structured C. Nearly all of
us can remember when the World Wide
...
Strategic Software Engineering
Strategic Software Engineering
Software is a disruptive technology that has changed how almost every
sector of human society and the economy works. Software is now pervasive;
it is a component of almost every industrial product or at least
essential to the development of such products. Software capabilities lie at
the core of the new national and
...
Reducing Risk with Software Process Improvement
Reducing Risk with Software Process Improvement
This book describes observations made over a period of ten years in
projects and organizations involved in the field of Information Technology
(IT), focusing on the areas of software development and maintenance. It
highlights the most frequently encountered problems because of poor
processes, the term process being defined as
...
JavaScript Demystified
JavaScript Demystified

Every web surfer knows a classy web site when he sees one, because it has eyecatching features that make the site outstanding among other sites on the web.

Developers of these sites leave web surfers in awe not by using fancy animation or provocative pictures, but by using subtle tricks such as fl oating menus and moveable
...

Statistical and Inductive Inference by Minimum Message Length (Information Science and Statistics)
Statistical and Inductive Inference by Minimum Message Length (Information Science and Statistics)
My thanks are due to the many people who have assisted in the work reported here and in the preparation of this book. The work is incomplete and this account of it rougher than it might be. Such virtues as it has owe much to others; the faults are all mine.

My work leading to this book began when David Boulton and I attempted to develop
...
Comprehensive Functional Verification: The Complete Industry Cycle (Systems on Silicon)
Comprehensive Functional Verification: The Complete Industry Cycle (Systems on Silicon)
As designs increase in complexity, so has the value of verification engineers within the hardware design team. In fact, the need for skilled verification engineers has grown dramatically--functional verification now consumes between 40 and 70% of a project's labor, and about half its cost. Currently there are very few books on verification for...
Kinetics of Catalytic Reactions--Solutions Manual
Kinetics of Catalytic Reactions--Solutions Manual
This advanced textbook teaches readers to design kinetic experiments involving heterogeneous catalysts, to characterize these catalysts, to acquire rate data, to find heat and mass transfer limitations in these data, to select reaction models, to derive rate expressions based on these models, and to assess the consistency of these rate equations....
Cutaneous Lymphomas (Basic and Clinical Dermatology)
Cutaneous Lymphomas (Basic and Clinical Dermatology)

Based on extensive clinical, histological, and experimental studies, this guide serves as an authoritative source of information on the epidemiology, etiology, pathogenesis, diagnosis, and treatment of cutaneous lymphomas-reflecting the state-of-the-art in the field of cutaneous lymphomas-presented in the context of the brand-new...

Correspondence Analysis and Data Coding with Java and R (Chapman & Hall/CRC Computer Science & Data Analysis)
Correspondence Analysis and Data Coding with Java and R (Chapman & Hall/CRC Computer Science & Data Analysis)
Developed by Jean-Paul Benzérci more than 30 years ago, correspondence analysis as a framework for analyzing data quickly found widespread popularity in Europe. The topicality and importance of correspondence analysis continue, and with the tremendous computing power now available and new fields of application emerging, its...
Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) Presents best practices for locking down network...
Performance Tuning for Linux(R) Servers
Performance Tuning for Linux(R) Servers
Proven techniques for optimizing web, file, print, database, and application servers Practical introductions to open source performance management tools Easy-to-understand examples based on Red Hat Enterprise Linux and Novell SUSE Linux Enterprise ServerAn indispensable guide to maximizing Linux system and application performanceFrom Wall...
Result Page: Previous 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy