Speed T.
|
Библиография книг автора
Speed T.
Records and Memorials of the Speed Family
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible....
|
Нет в наличии |
Speed T.
The Union Cause in Kentucky, 1860-1865
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible....
|
Нет в наличии |
Anderson J.
Byrd D.
Gibson B.
Rosen B.
Schauf B.
Speed T.
IBM Lotus Notes and Domino 8.5.1
Upgrade your system and embrace the exciting new features of the Lotus Notes and Domino 8.5....
|
Нет в наличии |
Byrd D.
Hardison S.
Livingston S.
Martin M.
Moore J.
Speed T.
Wood G.
IBM Lotus Connections 2.5: Planning and Implementing Social Software for Your Enterprise
The Practical, Complete Guide to Leveraging the Power of Social Networks with Lotus Connections 2.5 The first book to cover the newest version of the breakthrough product from IBM: Lotus Connections 2.5....
|
Нет в наличии |
Ellis J.
Korper S.
Speed T.
Speed T.
The Personal Internet Security Guidebook: Keeping Hackers and Crackers out of Your Home
The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network andprotect it from the \"bad dudes....
|
Нет в наличии |
Carrington C.
Ellis J.
Korper S.
Speed T.
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series)
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential \"hackers.\" If the directory structure is compromised, then the whole enterprise can be at risk....
|
Нет в наличии |
Ellis J.
Speed T.
Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses....
|
Нет в наличии |
Ellis J.
Speed T.
The Internet Security Guidebook: From Planning to Deployment
The Internet Security Guidebook provides a complete analysis of an enterprise\'s Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise....
|
Нет в наличии |