Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pump Handbook: Third Edition
Pump Handbook: Third Edition

It is difficult to follow in the footsteps of Igor J. Karassik, whose vision and leadership played a major role in the concept of a handbook on pumps that is broad enough to encompass all aspects of the subject—from the theory of operation through design and application to the multitude of tasks for which pumps of all types and sizes...

Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne
Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne

CHES 2009, the 11th workshop on Cryptographic Hardware and Embedded Systems, was held in Lausanne, Switzerland, September 6–9, 2009. The workshop was sponsored by the International Association for Cryptologic Research (IACR).

The workshop attracted a record number of 148 submissions from 29 countries, of which the...

Information Resources Management: Global Challenges
Information Resources Management: Global Challenges
The recent surge of technology outsourcing has intensified the cross-cultural effects of information systems designs and constructions, as well as the potential shortage of suitable information specialists at strategic locations. Millions of dollars of investments in information systems are at risk of being underutilized or rejected by users for...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Database Design (Mcgraw Hill Computer Science Series)
Database Design (Mcgraw Hill Computer Science Series)
The material in this book is the result of courses given at Stanford University as “File and Database Structures” since 1971. Initially little coherent published material was available, even though a large number of references could be cited.

In particular, no clear definition of the concept of a schema was available. Now
...
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
Engineering Documentation Control Handbook, 3rd Edition
Engineering Documentation Control Handbook, 3rd Edition
The wide acceptance of this book has been very gratifying. This work seems to have taken on a life of its own. The publisher wrote: “Your book over the last year has resulted in the most ‘Buy This Book’ links of our entire catalog … It is very well received by the ‘Googleites.’ ” Sales have exceeded 10,000...
IT Project+ Study Guide, 2nd Edition (Exam PKO-002)
IT Project+ Study Guide, 2nd Edition (Exam PKO-002)

Here’s the book you need to prepare for the latest version of CompTIA’s IT Project+ exam. This Study Guide was developed to meet the exacting requirements of today’s certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the “Best Study Guide”...

MPLS Network Management: MIBs, Tools, and Techniques
MPLS Network Management: MIBs, Tools, and Techniques
S everal years ago, there were only a handful of deployments of Multi-Protocol Label Switching (MPLS) technology, and those were restricted to researchers or nonproduction networks. Even in practice, MPLS was largely still theory. Over the past several years, MPLS has matured as a technology, and its acceptance and popularity in the marketplace has...
Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference
Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference

We would like to welcome you to the proceedings of the 2009 International Conference on Security Technology (SecTech 2009), which was organized as part of the 2009 International Mega-Conference on Future Generation Information Technology (FGIT 2009), held during December 10–12, 2009, at the International Convention Center Jeju,...

Safety Design for Space Systems
Safety Design for Space Systems
Progress in space safety lies in the acceptance of safety design and engineering as an integral part of the design and implementation process for new space systems. Safety must be seen as the principle design driver of utmost importance from the outset of the design process, which is only achieved through a culture change that moves all...
Business Intelligence with MicroStrategy Cookbook
Business Intelligence with MicroStrategy Cookbook

Over 90 practical, hands-on recipes to help you build your MicroStrategy business intelligence project, including more than a 100 screencasts

Overview

  • Learn about every step of the BI project, starting from the installation of a sample database
  • Design web reports and documents
  • ...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy