Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)
Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to...
MCSA/MCSE Self-Paced Training Kit (Exam 70-291)
MCSA/MCSE Self-Paced Training Kit (Exam 70-291)

Welcome to MCSA/MCSE Self−Paced Training Kit (Exam 70−291): Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Second Edition. This book prepares you for the 70-291 exam by teaching you how to configure, manage, and troubleshoot various aspects of a Microsoft Windows Server 2003 Service...

ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

Windows Server 2003/2000 Thin Client Solutions
Windows Server 2003/2000 Thin Client Solutions

This book brings together all the insights, knowledge, and step-by-step guidance you need to deliver robust, scalable, and stable server-based computing solutions with Microsoft Windows Terminal Services and Citrix MetaFrame Presentation Server 3.0. Building on two best-selling previous editions, expert consultant Todd W. Mathers...

Controlling the Quantum World: The Science of Atoms, Molecules, and Photons (Physics 2010)
Controlling the Quantum World: The Science of Atoms, Molecules, and Photons (Physics 2010)
As part of the Physics 2010 decadal survey project, the Department of Energy and the National Science Foundation requested that the National Research Council assess the opportunities, over roughly the next decade, in atomic, molecular, and optical (AMO) science and technology. In particular, the National Research Council was asked to cover...
Roitt's Essential Immunology, Tenth Edition (Essentials)
Roitt's Essential Immunology, Tenth Edition (Essentials)

Roitt's Essential Immunology has established itself as the book of choice for students of immunology worldwide. This excellent textbook is commonly regarded as 'the best of the immunology primers' and the tenth edition remains at the cutting edge of this fascinating area of science.

The trademark of this book is...

Practical Food Microbiology
Practical Food Microbiology
From the reviews of previous editions:-

"much information from diverse sources concentrated in a user-friendly way. A worthwhile, well-priced book which should find its way into frequent use in many laboratories." Society for General Microbiology Quarterly

"This book is a rare creature - a text of delightful clarity,...

Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development
Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development

With the advent of version 2 of the iPhone system, Apple proved they could do a remarkable thing — adapt their existing Cocoa computer application programming framework to make applications for a touch-based device with limited memory and speed and a dauntingly tiny display. The resulting Cocoa Touch framework, in fact, turned...

Mission Mars: India's Quest for the Red Planet (SpringerBriefs in Applied Sciences and Technology)
Mission Mars: India's Quest for the Red Planet (SpringerBriefs in Applied Sciences and Technology)

The objective of the book is to find an answer to the rationale behind the human quest for the Mars exploration. As a comprehensive assessment for this query is undertaken, it is realized that the basic question ‘Why Mars?’ seeks various responses from technological, economic and geopolitical to strategic perspectives. The book is...

Multistate Systems Reliability Theory with Applications
Multistate Systems Reliability Theory with Applications

Most books in reliability theory are dealing with a description of component and system states as binary: functioning or failed. However, many systems are composed of multi-state components with different performance levels and several failure modes. There is a great need in a series of applications to have a more refined description of these...

Extending and Modifying LAMMPS Writing Your Own Source Code: A pragmatic guide to extending LAMMPS as per custom simulation requirements
Extending and Modifying LAMMPS Writing Your Own Source Code: A pragmatic guide to extending LAMMPS as per custom simulation requirements

Understand the LAMMPS source code and modify it to meet your research needs, and run simulations for bespoke applications involving forces, thermostats, pair potentials and more with ease

Key Features

  • Understand the structure of the LAMMPS source code
  • Implement custom...
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

unlimited object storage image
Result Page: 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy