Search Results - Security information management

  1. 221
  2. 222
  3. 223

    Master visually Microsoft Windows Vista by Tidrow, Rob

    Published 2007
    Table of Contents: “…Setting up Windows Vista -- Preparing installation -- Installing Windows Vista -- Customizing and updating Windows Vista -- Pt 2. Managing the desktop environment -- Using the Windows Vista interface -- Customizing the desktop -- Managing users -- Managing files and folders -- Managing security -- Pt. 3. …”
    Click Here to View Status and Holdings.
    Unknown
  4. 224
  5. 225
  6. 226
  7. 227
  8. 228

    Data Communications and Networking by Forouzan, Behrouz A.

    Published 2013
    Table of Contents: “…Network models -- Introduction to physical layer -- Digital transmission -- Analog transmission -- Bandwidth utilization : Multiplexing and spectrum spreading -- Transmission media -- Introduction to data-link layer -- Error detection and correction -- Data Link Control (DLC) -- Media Access Control (MAC) -- Wired LANs : Ethernet -- Other wired networks -- Connecting devices and virtual LANs -- Introduction to network layer -- Network-layer protocols -- Unicast routing -- Multicast routing -- Next generation IP -- Introduction to transport layer -- Transport-layer protocols -- Introduction to application layer -- Standard client-server protocols -- Network management -- Multimedia -- Peer-to-peer paradigm -- Quality of service -- Cryptography and network security -- Internet security. …”
    Click Here to View Status and Holdings.
    Manuscript Book
  9. 229
  10. 230

    E-Health Systems

    Published 2018
    Click Here to View Status and Holdings.
    Manuscript Book
  11. 231
  12. 232
  13. 233
  14. 234
  15. 235
  16. 236
  17. 237
  18. 238
  19. 239
  20. 240