Home | Amazing | Today | Tags | Publishers | Years | Search 
Nmap in the Enterprise: Your Guide to Network Scanning
Nmap in the Enterprise: Your Guide to Network Scanning
Richard Stiennon, vice president at Gartner
"Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."

A
...
Connections: Patterns of Discovery
Connections: Patterns of Discovery
Every since the fl int axe triggered the Paleolithic Revolution over two million years ago we have lived by a culture of scarcity. Technology shortfall placed innovative capability in the hands of only a few: those who provided their hunter - gatherer communities with tools for hunting and butchering; then those who could read and write; then, much...
The Culture of Vengeance and the Fate of American Justice
The Culture of Vengeance and the Fate of American Justice
America is driven by vengeance in Terry Aladjem's provocative account - a reactive, public anger that is a threat to democratic justice itself. From the return of the death penalty to the wars on terror and in Iraq, Americans demand retribution and moral certainty; they assert the "rights of victims" and make pronouncements against...
Information Fusion in Signal and Image Processing: Major Probabilistic and Non-Probabilistic Numerical Approaches
Information Fusion in Signal and Image Processing: Major Probabilistic and Non-Probabilistic Numerical Approaches

The area of information fusion has grown considerably during the last few years, leading to a rapid and impressive evolution. In such fast-moving times, it is important to take stock of the changes that have occurred. As such, this books offers an overview of the general principles and specificities of information fusion in signal and image...

Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other,...
Tapestry 5: Building Web Applications
Tapestry 5: Building Web Applications
This book is a practical step-by-step tutorial for those who want to build contemporary, real-life web applications with Tapestry 5, the Apache open-source framework for creating dynamic, robust, highly scalable web applications in Java. It shows the path of least resistance, so that the reader can learn all the essential skills quickly and easily....
Microsoft Forefront Security Administration Guide
Microsoft Forefront Security Administration Guide
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other...
Computer-Supported Collaborative Learning: Best Practices and Principles for Instructors
Computer-Supported Collaborative Learning: Best Practices and Principles for Instructors
Decades of research have shown that student collaboration in groups doesn t just happen; rather it needs to be a deliberate process facilitated by the instructor. Promoting collaboration in virtual learning environments presents a variety of challenges.

Computer-Supported Collaborative Learning: Best Practices & Principles...

Adaptive Web Sites: A Knowledge Extraction from Web Data Approach - Volume 170 Frontiers in Artificial Intelligence and Applications
Adaptive Web Sites: A Knowledge Extraction from Web Data Approach - Volume 170 Frontiers in Artificial Intelligence and Applications
This book can be presented in two different ways; introducing a particular methodology to build adaptive Web sites and; presenting the main concepts behind Web mining and then applying them to adaptive Web sites. In this case, adaptive Web sites is the case study to exemplify the tools introduced in the text. The authors start by introducing the...
Dream Dictionary For Dummies (Psychology & Self Help)
Dream Dictionary For Dummies (Psychology & Self Help)
Dreams! What do they mean? You probably recognize a connection between the dream world and the “real” world, but did you know that you can actually do things to nurture your dream life? Dream Dictionary For Dummies is the fun and fascinating guide that shows you not only how to decode your dreams, but how to remember them and...
Recent Advances In Data Mining Of Enterprise Data: Algorithms and Applications (Series on Computers and Operations Research)
Recent Advances In Data Mining Of Enterprise Data: Algorithms and Applications (Series on Computers and Operations Research)

The main goal of the new field of data mining is the analysis of large and complex datasets. Some very important datasets may be derived from business and industrial activities. This kind of data is known as enterprise data . The common characteristic of such datasets is that the analyst wishes to analyze them for the purpose of designing a...

Second Life For Dummies (Computer/Tech)
Second Life For Dummies (Computer/Tech)
You’ve heard all about Second Life. Maybe you’ve already jumped with both feet—and gotten stuck. Or maybe you’re a Second Life veteran who wants to build something or run a business. Fear not! Second Life For Dummies is hear to hold your hand, pat your back, and cheer you on through this new and enchanting reality....
Result Page: Previous 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy