You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
A hands-on guide to creating and managing Web sites using the Microsoft BackOffice product suite. It explores what electronic commerce is, the role of networking technologies to industry growth, issues of privacy and security, and how to take an existing Web server and create an electronic storefront. Key features include examples of how to use SQL Server, Transaction Server, Internet Information Server and Commerce Server to create a Web site capable of providing content simultaneously to thousands of users, verify contents, and distribute products electronically.
None
Focusing on the needs of the hobbyist, PC enthusiast, as well as system administrator, this is a comprehensive book for anyone interested in learning the hands-on aspects of SCSI. This book offers the functionality that intermediate and advanced system users need for configuring SCSI on their systems.
None
What if the true weak link of the Information Age force is not the hardware of machines, but the software of the human mind? And if so, could it be that the entire conceptual structure of the Information Revolution theorists, at least as it applies to military affairs, is built on sand, on the notorious fickleness of human cognition? These are the questions this book strives to examine. Looking at the command and control of information-rich warfare, the contributors explore its potential new processes, techniques, and organizational structures. As they do so, they find reasons for both optimism and concerns about the limitations of human cognition and supporting technologies in commanding ba...
Since the mid-1940s, when Vannevar Bush and Theodore von Karman wrote Science, the Endless Frontier and Toward New Horizons, respectively, there has been a consensus that strong Department of Defense support of science and technology (S&T) is important to the security of the United States. During the Cold War, as it faced technologically capable adversaries whose forces potentially outnumbered U.S. forces, the United States relied on a strong defense S&T program to support the development of technologically superior weapons and systems that would enable it to prevail in the event of conflict. Since the end of the Cold War, the United States has relied on its technological superiority to main...
Discusses what hardware computer engineers do and how to prepare for a career in this field.
None