Mining the Gold From Facebook continues where The Prospector's Guide to Social Media Marketing left off. It takes an in depth, step by step approach to setting up and maintaining a business presence……続きを見る
There is a clear need for a systematic, integrative, and rigorous normative theory of the information society. In this book, Duff offers a prescriptive theory to help to guide the academic and polic……続きを見る
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus soft……続きを見る
This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed "how-to" instructions are presented, which will be of use ……続きを見る
A web application involves many specialists, but it takes people in web ops to ensure that everything works together throughout an application's lifetime. It's the expertise you need when your start……続きを見る
Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason i……続きを見る
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths ……続きを見る
Smart Home Automation with Linux and Raspberry Pi shows you how to automate your lights, curtains, music, and more, and control everything via a laptop or mobile phone.
You'll learn how to use Linux……続きを見る
If you’ve been charged with setting up storage area networks for your company, learning how SANs work and managing data storage problems might seem challenging. Storage Area Networks For Dummies, 2n……続きを見る
The Power of IP Video
Unleashing Productivity with Visual Networking
Jennifer C. Baker
Felicia Brych Dalke
Michael Mitchell
Nader Nanjiani
The definitive guide to deriving business value from IP vid……続きを見る
Connecting Canadians represents the work of the Community Research Alliance for Community Innovation and Networking (CRACIN), the largest national and international research effort to examine the bu……続きを見る
This book aims to provide a complete overview of the diagnosis and treatment of gastrointestinal stromal tumors (GISTs). It has been conceived to be both a detailed guide for clinical practice and a……続きを見る
The proliferation of mobile media in recent years is an international phenomenon, with billions of devices sold annually. Mobile communications are now moving beyond individualized voice to mass med……続きを見る
Information engineering and applications is the field of study concerned with constructing information computing, intelligent systems, mathematical models, numerical solution techniques, and using c……続きを見る
著者:Neal Allen
出版社: Pearson Education
発売日: 2009年10月18日
Network Maintenance and Troubleshooting Guide
Field-Tested Solutions for Everyday Problems, Second Edition
Neal Allen
The 100% practical, real-world guide to anticipating, finding, and solving netwo……続きを見る
This book provides an introduction to Bluetooth programming, with a specific focus on developing real code. The authors discuss the major concepts and techniques involved in Bluetooth programming, w……続きを見る
The efficient management of a consistent and integrated database is a central task in modern IT and highly relevant for science and industry. Hardly any critical enterprise solution comes without an……続きを見る
Body area networks (BANs) are networks of wireless sensors and medical devices embedded in clothing, worn on or implanted in the body, and have the potential to revolutionize healthcare by enabling ……続きを見る
This comprehensive text/reference examines in depth the synergy between multimedia content analysis, personalization, and next-generation networking. The book demonstrates how this integration can r……続きを見る
Are all film stars linked to Kevin Bacon? Why do the stock markets rise and fall sharply on the strength of a vague rumour? How does gossip spread so quickly? Are we all related through six degrees ……続きを見る
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This How-to guide will explore TShark. As this is the terminal version, it will show ……続きを見る
With This Top-Rated Information, learn to Make Money Blogging, Blogging Software, Free Blogs, Blogging for Creatives, Blogging Profits and Blogging Cash Formula
続きを見る
Cisco IOS XR Fundamentals is a systematic, authoritative guide to configuring routers with Cisco IOS® XR, the next-generation flagship Cisco® Internet operating system.
In this book, a team of Cisco……続きを見る
With SharePoint 2010, developers finally have the powerful, end-to-end development tools they need to build outstanding solutions quickly and painlessly. What’s more, those tools are built directly ……続きを見る
Red Hat Certified Engineer (RHCE) is a performance-based test that measures actual competency on live systems. Called the "crown jewel of Linux certifications," RHCE proves an individual's ability t……続きを見る
This book is written for SQL Server 2008. However, it does maintain roots going back a few versions and looks out for backward compatibility issues with SQL Server 2005 and SQL Server 2000. These ve……続きを見る
The current diversity of transport services, as well as the complexity resulting from the deployment of specific transport protocols or mechanisms over the different services provided by heterogeneo……続きを見る
GNS3 Network Simulation Guide is an easy-to-follow yet comprehensive guide which is written in a tutorial format helping you grasp all the things you need for accomplishing your certification or sim……続きを見る
The comprehensive A-to-Z guide on network security, fully revised and updated
Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest de……続きを見る
出版社: Springer International Publishing
発売日: 2016年05月23日
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. T……続きを見る