For student and instructor convenience , the core components of this instructional system are available in either a kit format or a book format . Gregg College Keyboarding Lessons 1–20 , 5th Edition , is also available for the ...
Written by the co-managers of the Kermit Project, this is a revised and updated tutorial on data communications, with new material on today's high-speed modems and how to make the best use of them
For repairing performance loss or maximizing current potential, this guide aims to provide the information and conceptual framework that will enable readers to be performance experts.
Fully updated and optimized for ease of use, the Microsoft Manual of Style is designed to help you communicate clearly, consistently, and accurately about technical topics—across a range of audiences and media.
This comprehensive guide covers everything from deciding what type of network meets your needs to setting up the hardware and software, connecting different operating systems, installing the necessary applications, managing the network, and ...
Updated with the latest advances from the field, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Fifth Edition combines all-encompassing topic coverage, authoritative information from seasoned experts, and real-world applications to deliver ...
A Practitioner's Guide to Software Test Design describes a set of key test design strategies that improve both the efficiency and effectiveness of software testers . Structure and Approach A Practitioner's Guide to Software Test Design ...
For MIS specialists and nonspecialists alike, a comprehensive, readable, understandable guide to the concepts and applications of decision support systems.
Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide.
Filling the need for a single source that introduces all the important network security areas from a practical perspective, this volume covers technical issues, such as defenses against software attacks by system crackers, as well as ...
AIX Version 6.1 provides many significant new security technologies and security enhancements. ... features in AIX V6, you should refer to the IBM Redbooks publication Introduction to Workload Partition Management in AIX V6, SG24-7431.