Home | Amazing | Today | Tags | Publishers | Years | Search 
IMS: A Development and Deployment Perspective
IMS: A Development and Deployment Perspective
Providing an holistic approach to IMS technologies, IMS: A Development and Deployment Perspective explores service architecture for development and delivery of IMS services.  Approaching IMS from the perspective of the user and the service provider it examines both the current state of deployment and future trends. The book offers a...
Networking, A Beginner's Guide, Fifth Edition (Networking Professional's Library)
Networking, A Beginner's Guide, Fifth Edition (Networking Professional's Library)

A practical guide to networking fundamentals

Fully up to date with the latest technologies, this introductory handbook covers wired and wireless network design, configuration, hardware, protocols, security, backup, recovery, virtualization, and more. After laying the groundwork, Networking: A Beginner's Guide, Fifth...

Vulnerability Management
Vulnerability Management

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any...

Microsoft  Windows 7 Your Way: Speed Up and Customize Window
Microsoft Windows 7 Your Way: Speed Up and Customize Window

Want to make Windows 7 run faster, smarter, easier, better? Want to personalize Windows to look and act the way you want it to? Want to get
more efficient and ditch all those Windows hassles? You don’t need
a Ph.D in computer science or expensive upgrades. All you need is this book!

...
Advanced Batteries: Materials Science Aspects
Advanced Batteries: Materials Science Aspects
Energy is important to all of us, for a variety of reasons, but primarily because it can be useful. It can be found in a number of different forms. One readily recognizes the concepts of potential energy and kinetic energy, as well as the chemical energy in fuels, thermal energy as heat, the kinetic energy in wind and moving water, and magnetic and...
Secrets of the JavaScript Ninja
Secrets of the JavaScript Ninja

There is nothing simple about creating effective, cross-browser, JavaScript code. In addition to the normal challenge of writing clean code you have the added complexity of dealing with obtuse browser complexities. To counter-act this JavaScript developers frequently construct some set of common, reusable, functionality in the form of...

Harming Future Persons: Ethics, Genetics and the Nonidentity Problem (International Library of Ethics, Law, and the New Medicine)
Harming Future Persons: Ethics, Genetics and the Nonidentity Problem (International Library of Ethics, Law, and the New Medicine)

This collection of essays investigates the obligations we have in respect of future persons, from our own future offspring to distant future generations. Can we harm them? Can we wrong them? Can the fact that our choice brings a worse off person into existence in place of a better off but "nonidentical" person make...

97 Things Every Programmer Should Know: Collective Wisdom from the Experts
97 Things Every Programmer Should Know: Collective Wisdom from the Experts

Programmers have a lot on their minds . Programming languages, programming techniques, development environments, coding style, tools, development process, deadlines, meetings, software architecture, design patterns, team dynamics, code, requirements, bugs, code quality. And more. A lot. There is an art, craft, and science to programming that...

Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself
Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself

"Sloan's easy and informative writing makes for a thoroughly worthwhile update."--BARRON’S

"A useful corrective to the view of short selling as 'unpatriotic' or uniquely anti-social."--John Plender, Financial Times, November 16, 2009

"I liked this...

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab

Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!

Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a...

2012: The Return of Quetzalcoatl
2012: The Return of Quetzalcoatl

The acclaimed metaphysical epic that binds together the cosmological phenomena of our time, ranging from crop circles to quantum theory to the resurgence of psychedelic drugs, to support the contention of the Mayan calendar that the year 2012 portends a global shift-in consciousness, culture, and way of living-of unprecedented...

The Rhetorical Nature of XML: Constructing Knowledge in Networked Environments
The Rhetorical Nature of XML: Constructing Knowledge in Networked Environments

The Rhetorical Nature of XML is the first volume to combine rhetoric, XML, and knowledge management in a substantive manner. It serves as a primer on XML and XML-related technologies, illustrating how the naming of XML elements can be understood as a rhetorical act, and detailing the essentials of knowledge management practices that...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy