Flylib.com
Chapter 11. Disks
Previous page
Table of content
Next page
Chapter 11. Disks
Introduction
Related Files
Commands
Previous page
Table of content
Next page
Linux Desk Reference (2nd Edition)
ISBN: 0130619892
EAN: 2147483647
Year: 2000
Pages: 174
Authors:
Scott Hawkins
BUY ON AMAZON
Developing Tablet PC Applications (Charles River Media Programming)
The Tablet PC
Using Gestures to Control Tablet Media Player
Custom Grammars for Speech Recognition
Pong Game
Storing Ink in a Database
Cisco Voice Gateways and Gatekeepers
Deployment Scenarios
Circuit Signaling
Connecting to the PSTN
Gatekeepers with CallManager
Case Study: Deploying Gatekeepers to Assist in Migration to VoIP
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 66. Filter MAC with HostAP and Madwifi
Hack 68. Set Up an OLSR Mesh Network
Hack 84. Spider Omni Antenna
Hack 90. Build a Slotted Waveguide Antenna
Section A.4. 802.11g: Like 802.11b, only Faster
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Credibility and Computers
Credibility and the World Wide Web
Captology Looking Forward
Web Systems Design and Online Consumer Behavior
Chapter I e-Search: A Conceptual Framework of Online Consumer Behavior
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter IX Extrinsic Plus Intrinsic Human Factors Influencing the Web Usage
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
Comparing, Designing, and Deploying VPNs
VPN Devices
Review Questions
IPsec: A Security Architecture for IP
Summary
MTU and Fragmentation Considerations in an IPsec VPN
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies