Showing 61 - 72 of 253 results

Search For

Below Are Your Selected Attending Tradeshow


Hack Attacks Denied: A Complete Guide to NetworkLockdown

Hack Attacks Denied: A...

by John Chirillo
  • Published in 2001
  • 512
Efficient Algorithms for MPEG Video Compression

Efficient Algorithms f...

by Dzung Tien Hoang, Jeffrey Scott Vitter
  • Published in 2002
  • 169
Blueprints for High Availability: Designing Resilient Distributed Systems

Blueprints for High Av...

by Evan Marcus, Hal Stern
  • Published in 2000
  • 368
The Twofish Encryption Algorithm: A 128-Bit BlockCipher

The Twofish Encryption...

by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall
  • Published in 1999
  • 208
Building PDA Databases for Wireless and MobileDevelopment

Building PDA Databases...

by Robert Laberge, Srdjan Vujosevic
  • Published in 2002
  • 336
Developing Client/Server Systems Using Sysbase SQLServer System 11

Developing Client/Serv...

by Sanjiv Purba
  • Published in 1996
  • 544
The Internet Telephone Toolkit

The Internet Telephone...

by Jeff Pulver
  • Published in 1996
  • 201
Business Data Communications and Networking, 5th Edition

Business Data Communic...

by Jerry FitzGerald, Alan Dennis
  • Published in 1995
  • 592
Highly Available Storage for Windows Servers (VERITAS Series)

Highly Available Stora...

by Paul Massiglia
  • Published in 2002
  • 464
IP-Enabled Energy Management: A Proven Strategy for Administering Energy as a Service

IP-Enabled Energy Mana...

by Rob Aldrich, John Parello
  • Published in 2010
  • 288
Web-Based Network Management: Beyond the Browser

Web-Based Network Mana...

by Curt Harler
  • Published in 1999
  • 244
Enterprise Networking for IS Professionals

Enterprise Networking...

by Norman Witkin
  • Published in 1995
  • 254

Showing 61 - 72 of 253 results

loading