Monthly Archive: May 2012

iPad and iPhone Tips and Tricks 0

iPad and iPhone Tips and Tricks

For iOS 5 on iPad 2 and iPhone 4/4s Discover hundreds of tips and tricks you can use with your iPad or iPhone to maximize its functionality as you use your iOS 5 mobile device as a...

My Xbox 0

My Xbox

Covers Xbox 360, Kinect, and Xbox LIVE Step-by-step instructions with callouts to Xbox photos that show you exactly what to do Help when you run into problems with Xbox 360, Kinect, or Xbox LIVE Tips and...

The NOOK Book, 3rd Edition 0

The NOOK Book, 3rd Edition

Make the Most of Any B&N NOOK–Including NOOK Tablet, NOOK Color, or NOOK Simple Touch! Read books, play media, get free content, uncover powerful, little-known features you’ll love! Do all this, and much more… Discover great...

Building Multiservice Transport Networks 0

Building Multiservice Transport Networks

A comprehensive handbook for understanding, designing, and deploying multiservice network architecture and applications Design, deploy, operate, and troubleshoot ONS 15454 applications and services Learn SONET/SDH and DWDM fundamentals Understand Multiservice Provisioning Platform (MSPP) network architectures that support...

Building Resilient IP Networks 0

Building Resilient IP Networks

The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs)...

SSL Remote Access VPNs 0

SSL Remote Access VPNs

Cisco® SSL VPN solutions (formerly known as Cisco WebVPN solutions) give you a flexible and secure way to extend networking resources to virtually any remote user with access to the Internet and a web browser. Remote...

The CERT Guide to Insider Threats 0

The CERT Guide to Insider Threats

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of...

Experiences of Test Automation 0

Experiences of Test Automation

Software test automation has moved beyond a luxury to become a necessity. Applications and systems have grown ever larger and more complex, and manual testing simply cannot keep up. As technology changes, and more organizations move...