Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 768
- Management 727
- Engineering & Applied Sciences 715
- History 674
- Application software 584
- Computer Science 481
- Historia 379
- Data processing 351
- Computer networks 348
- Leadership 300
- Business & Economics 291
- Computer software 276
- Design 276
- Economics 276
- Database management 261
- Computer programs 255
- Artificial intelligence 254
- Information technology 253
- Security measures 253
- Education 250
- Computer programming 241
- Python (Computer program language) 233
- Social aspects 232
- Cloud computing 230
- Web site development 229
- Computer security 223
- Web sites 222
- Java (Computer program language) 221
- Medicine 214
- Business 200
-
21321Publicado 2001“…He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? …”
Libro electrónico -
21322por Bhaiji, Fahim Hussain Yusuf“…Written by a CCIE Security engineer and Cisco Systems CCIE proctor, this book lays out seven end-to-end scenarios that are both complex and realistic, providing you with the practice needed to prepare for your lab examination and develop critical-thinking skills that are essential for resolving complex, real-world security problems. While many engineers are able to configure single technologies in standalone environments, most will struggle when dealing with integrated technologies in heterogeneous environments. …”
Publicado 2004
Libro electrónico -
21323Publicado 2008“…He also provides detailed checklists for handling crucial issues such as caching, networking, storage, and hardware selection. Many of his techniques and practices apply to all current virtualization platforms, not just ESX Server. …”
Libro electrónico -
21324por Hucaby, Dave“…Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources. “Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. …”
Publicado 2008
Libro electrónico -
21325por Mugridge, Rick“…Testing business rules is a fundamentally hard thing that has confounded many, and yet these two have devised a mechanism that cuts to the essence of the problem. …”
Publicado 2005
Libro electrónico -
21326Publicado 2007“…Denise was a Cisco instructor and course director for Global Knowledge and did network consulting for many years. Her CCIE is in Routing and Switching. …”
Libro electrónico -
21327“…Through the use of real-world deployment examples, this book leads you through all the steps necessary for proper design and sizing, installation and troubleshooting, forensic analysis of security events, report creation and archiving, and integration of the appliance with Cisco and third-party vulnerability assessment tools. “In many modern enterprise networks, Security Information Management tools are crucial in helping to manage, analyze, and correlate a mountain of event data. …”
Libro electrónico -
21328por Golden, Bernard, 1953-“….” — Chris Stone, Vice Chairman, Novell “Open source software addresses many of the needs of IT organizations. While more and more organizations are using open source software, few understand how to evaluate it in the absence of a parent organization. …”
Publicado 2005
Libro electrónico -
21329por Shalloway, Alan“…Then, using easy-to-understand sample code, Alan Shalloway and James Trott illuminate dozens of today's most useful patterns: their underlying concepts, advantages, tradeoffs, implementation techniques, and pitfalls to avoid. Many patterns are accompanied by UML diagrams. Building on their best-selling First Edition, Shalloway and Trott have thoroughly updated this book to reflect new software design trends, patterns, and implementation techniques. …”
Publicado 2004
Libro electrónico -
21330por Dowd, Mark“…Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications . …”
Publicado 2007
Libro electrónico -
21331por Carter, Sandy, 1963-“…This book embodies her invaluable work and the work of many at IBM to research, define, deploy and make SOA happen. …”
Publicado 2007
Libro electrónico -
21332Publicado 2004“…Atreya Chakraborty, Senior Consultant,The Brattle Group "Through consulting, I have witnessed far too many failedinvestments—and even worse, failing companies!…”
Libro electrónico -
21333Publicado 2003“…You'll begin by learning how UML is used to model the structure of a system. Many key UML concepts, especially that of the general (classes) versus the specific (objects), are illustrated in the chapter on class and object diagrams. …”
Libro electrónico -
21334por Gross, Christian“…(REST Based Model View Controller pattern) My page has so many links managed by JavaScript, and I am losing control, help me make this more organized! …”
Publicado 2006
Libro electrónico -
21335Publicado 2009“…Weisfeld has published many articles in major computer trade magazines and professional journals…”
Libro electrónico -
21336por Kleindorfer, Paul R.“…For the first time, The Network Challenge brings together thought leaders from many fields—a team of experts as broad as the network challenge itself.” …”
Publicado 2009
Libro electrónico -
21337por Ballad, Tricia“…Why? Because they know many of these apps are written by programmers with little or no experience or training in software security. …”
Publicado 2009
Libro electrónico -
21338Publicado 2009“…This IP transition begins with function-specific migrations of specific network domains and ends with an end-to-end IP network for radio, transport, and service delivery. The book introduces many concepts to give you exposure to the key technology trends and decision points affecting today’s mobile operators. …”
Libro electrónico -
21339Publicado 2013“…How many years will you have to work so that you build a decent pension? …”
Libro electrónico -
21340Publicado 2008“…The book is further equipped with numerous case study examples and many illustrations. Fundamental and Advanced WSDL Tutorial coverage of WSDL 1.1 and 2.0 and detailed descriptions of their differences is followed by numerous advanced WSDL topics and design techniques, including extreme loose coupling, modularization options, use of extensibility elements, asynchrony, message dispatch, service instance identification, non-SOAP HTTP binding, and WS-BPEL extensions. …”
Libro electrónico