Information Technology

Per Page:
Sort:

Secure Computers and Networks: Analysis, Design, and Implementation

Eric A. Fisch, Gregory B. White
December 28, 1999

This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer System and Network Security, this new book addresses important concerns regarding network security. It contains new...

Business Resumption Planning, Second Supplement

Edward S. Devlin, Cole Emerson, Leo A. Wrobel, Mark B. Desman
December 27, 1999

Offering hundreds of tips, templates, checklists, and pointers to information in the public domain, Business Resumption Planning, Second Edition assists you in creating a rock solid recovery plan for any size organization. It provides the information you need in order to coordinate first responders...

Introduction to Microsoft Windows NT Cluster Server: Programming and Administration

Raj Rajagopal
December 15, 1999

Mastering cluster technology-the linking of servers-is becoming increasingly important for application and system programmers and network designers, administrators, and managers. With Microsoft's Windows NT cluster server being the first to tie cluster technology with a major operating system, it...

Artificial Intelligence and Soft Computing: Behavioral and Cognitive Modeling of the Human Brain

Amit Konar
December 08, 1999

With all the material available in the field of artificial intelligence (AI) and soft computing-texts, monographs, and journal articles-there remains a serious gap in the literature. Until now, there has been no comprehensive resource accessible to a broad audience yet containing a depth and...

The Network Manager's Handbook, Third Edition: 1999

John M. Lusa
December 01, 1999

The Network Manager's Handbook is a one-of-a-kind resource featuring critical network technology assessments and career development advice from some of the most highly respected consultants and network managers in the field. This answer-filled compendium provides a rich blend of precise knowledge...

Handbook of Data Management 1999 Edition

Sanjiv Purba
November 29, 1999

Written by leading industry experts, the Data Management Handbook is a comprehensive, single-volume guide to the most innovative ideas on how to plan, develop, and run a powerful data management function - as well as handle day-to-day operations. The book provides practical, hands-on guidance on...

Computational Intelligence for Decision Support

Zhengxin Chen
November 24, 1999

Intelligent decision support relies on techniques from a variety of disciplines, including artificial intelligence and database management systems. Most of the existing literature neglects the relationship between these disciplines. By integrating AI and DBMS, Computational Intelligence for...

Multi-Operating System Networking: Living with UNIX, NetWare, and NT

Raj Rajagopal
November 08, 1999

Here is all the practical, hands-on information you need to build, manage and maintain a heterogeneous computing environment with hardware, software, and network equipment from a number of different vendors. Packed with real-world case studies and proven techniques for integrating disparate...

IS Management Handbook, Seventh Edition

Carol V. Brown
October 28, 1999

In systems analysis, programming, development, or operations, improving productivity and service - doing more with less - is the major challenge. Regardless of your management level, the Handbook gives you the advice and support you need to survive and prosper in the competitive environment. It is...

Enterprise Operations Management Handbook, Second Edition

Auerbach, Steve Blanding
October 22, 1999

The Enterprise Operations Management Handbook provides the expert advice and guidance of hundreds of leading computing practitioners and consultants. Covering all major areas of enterprise operations management, this edition provides essential information for managing a modern, evolving data center...

Access Device Fraud and Related Financial Crimes

Jerry Iannacci
September 29, 1999

Access Device Fraud and Related Financial Crimes offers front-line exposure. It is a reference text that affords the student, financial investigator or law enforcement professional a true insight into a wide spectrum of criminal activity involving financial crimes. This book brings the reader...

Conferences

Year: