MASSIVE SAVINGS JUST FOR YOU!
VIEW DEALS

Related Articles

6 228 products

Advertisement

This project is a critical, rhetorical study of the digital text we call the Internet, in particular the style and figurative surface of its many pages as well as the conceptual, design
📱 General
This volume comprises a collection of papers from the 12th international conference on information networking. (ICOIN-12) held in Tokyo 1998. Technical papers on communication networks and distributed systems were presented, along side
📱 Networking
21% OFF
Explaining how to protect Web 2.0 architecture from different types of cybercrime, a team of Internet security professionals demonstrates how hackers work to infiltrate and attack Web 2.0-based services and demonstrates a
📱 Networking
20% OFF
Implement an Effective Security Metrics Project or Program IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book
📱 Networking
Computing technology is an indispensable feature of modern life. Our rapid-paced world seems more and more remote from the world narrated in sacred scriptures. However, despite its pervasiveness, there remains a dearth
📱 Software
20% OFF
This authorized guide from Oracle Press explains how to administer Oracle9i on all of the major UNIX platforms, including Solaris, HP-UNIX and IBM-UNIX, and Linux. Inside, you'll find proven techniques and UNIX
21% OFF
Written by members of the Oracle XML group, this is a must-have reference for all IT managers, DBAs, and developers who want to learn the best practices for using XML with Oracle's
📱 Databases
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.