Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Genetic Programming Theory and Practice VI (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice VI (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice VI was developed from the sixth workshop at the University of Michigan’s Center for the Study of Complex Systems to facilitate the exchange of ideas and information related to the rapidly advancing field of Genetic Programming (GP). Contributions from the foremost international...
Professional Microsoft Office SharePoint Designer 2007 (Wrox Programmer to Programmer)
Professional Microsoft Office SharePoint Designer 2007 (Wrox Programmer to Programmer)
With Professional Microsoft Office SharePoint Designer 2007, you can master all aspects of using Share Point Designer in an Enterprise environment to enhance Microsoft SharePoint Products and Technologies. Review key integration points, how to use CSS editing tools to create and modify SharePoint themes, how to supplement SharePoint...
Goal Directed Project Management: Effective Techniques and Strategies
Goal Directed Project Management: Effective Techniques and Strategies
This book deals with project management and presents the requirements for successful projects. We show you how to use proven methods and tools to guide your projects towards their goals, thereby significantly increasing your probability of achieving project success.

The book is written for project managers and everyone participating in
...
Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Clinical Malignant Hematology
Clinical Malignant Hematology

The only comprehensive guide to the clinical management of hematologic and lymphatic cancers

4 STAR DOODY'S REVIEW!
"This will be an ideal and a must-have book for anyone involved in the daily care of patients with hematologic malignancies. It would be particularly useful for physicians-in-training
...

CMMI® SCAMPI Distilled Appraisals for Process Improvement
CMMI® SCAMPI Distilled Appraisals for Process Improvement

The Standard CMMI Appraisal Method for Process Improvement (SCAMPI) is an invaluable tool for organizations seeking to drive quantifiable improvements in systems and software engineering. SCAMPI appraisals can help those organizations identify the strengths and weaknesses of their current processes, reveal crucial development...

Linux® Patch Management: Keeping Linux® Systems Up To Date
Linux® Patch Management: Keeping Linux® Systems Up To Date

The Start-to-Finish Patch Management Guide for Every Linux® Environment

To keep your Linux systems secure, reliable, and productive, you must stay current with patches and updates. But, until now, it has been difficult to find usable,...

Effective Enterprise Java
Effective Enterprise Java

If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to:

  • Use in-process or local storage to avoid the network

    ...
Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS)
Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS)
Mobility is perhaps the most important market and technological trend
within information and communication technology. With the advent of new
mobile infrastructures providing higher bandwidth and constant connection
to the network from virtually everywhere, the way people use information
resources is predicted to be radically
...
Windows Server 2003 Pocket Administrator
Windows Server 2003 Pocket Administrator
Twenty years ago, when most computers were mainframes
or minicomputers, operators and administrators had
scheduled, specific tasks they needed to perform on an
ongoing basis. Each time a task was performed, they had
to make note of the time and write their initials in a
logbook to demonstrate when the task was performed...
Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

unlimited object storage image
Result Page: 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy