Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Your Wireless Network
Hack Proofing Your Wireless Network
When the concept of a network without wires was first suggested more than two
decades ago, it sparked the imagination of scientists, product vendors, and users
around the globe eager for the convenience and flexibility of a free roaming connection.
Unfortunately, as the variety of wireless solutions began to emerge, anticipation...
Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2), is a Cisco®-authorized, self-paced learning tool for CCNA® foundation learning. This book provides you with the knowledge needed to install, operate, and troubleshoot a small to medium-size branch office enterprise network, including configuring several switches and routers,...
Developing  a hapi Edge: A rich Node.js framework for apps and services
Developing a hapi Edge: A rich Node.js framework for apps and services

“Developing a hapi Edge” shows you how to build enterprise-quality web applications using the hapi service and application framework. By walking through the creation of a real web application, hapi-plugins.com, you will learn how to configure and start hapi, build out APIs, perform authentication, validation, caching, and so much...

Stem Cell Transplantation for Hemotologic Malignancies (Contemporary Hematology)
Stem Cell Transplantation for Hemotologic Malignancies (Contemporary Hematology)

A comprehensive survey of the current state-of-the-art in hematopoietic stem cell transplantation for malignant disease. The authors focus on the indications and results of transplantation for acute leukemia, chronic myelogenous leukemia, lymphoma, multiple myeloma, and breast cancer. Special attention is given to transplant-related...

Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
The failure to adequately address the victims and the emotional dimensions of corporate problems changes adverse events into crises and catastrophes. This book aims to arm employees and managers with the tools necessary to manage emotional distress.

Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line is an...

Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)
Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)

My objective in writing this book was to produce a general, comprehensive textbook that treats all the essential core areas of cryptography. Although many books and monographs on cryptography have been written in recent years, the majority of them tend to address specialized areas of cryptography. On the other hand, many of the existing general...

Practical .NET for Financial Markets
Practical .NET for Financial Markets
Practical .NET for Financial Markets was born because we were convinced no focused literature
existed for people involved in application/product development in financial markets using .NET.
Although a lot of .NET-related material is available, most often it is not relevant for developers in
the finance domain. The finance domain
...
The Postcolonial Enlightenment: Eighteenth-century Colonialism and Postcolonial Theory
The Postcolonial Enlightenment: Eighteenth-century Colonialism and Postcolonial Theory
Over the last thirty years, postcolonial critiques of European imperial practices have transformed our understanding of colonial ideology, resistance, and cultural contact. The Enlightenment has played a complex but often unacknowledged role in this discussion, alternately reviled and venerated as the harbinger of colonial dominion and avatar of...
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in digital forensic analysis of Windows systems. I am simply someone who has found an interest in my chosen field of employment, and a passion to dig deeper. I enjoy delving into and extending the...
Waste to Energy: Opportunities and Challenges for Developing and Transition Economies
Waste to Energy: Opportunities and Challenges for Developing and Transition Economies

Solid waste management is currently a major issue worldwide with numerous areas reaching critical levels. Many developing countries and countries in transition still miss basic waste management  infrastructure and awareness. It is here that many of the solid waste management problems and challenges are currently being faced. As such,...

Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
Content Networking Fundamentals
Content Networking Fundamentals

A comprehensive introduction to the theory and practical applications of content networking 

  • Get a strong introduction to the basic networking concepts necessary for content networking, including network address translation, IP multicast content delivery, quality of service, and...

unlimited object storage image
Result Page: 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy