Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Governance, Risk, and Compliance Handbook for Oracle Applications
Governance, Risk, and Compliance Handbook for Oracle Applications
  • Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
  • Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
  • ...
Canon Speedlite System Digital Field Guide
Canon Speedlite System Digital Field Guide

Welcome to the new Wiley Digital Field Guide for the Canon Speedlite System. Whether you are holding this book or your new Canon Speedlite in your hands, you are holding a fantastic tool that will assist you in creating awesome photographs that you will be proud to display and share with your family and friends. Much has changed in...

SSL Remote Access VPNs (Networking Technology: Security)
SSL Remote Access VPNs (Networking Technology: Security)
This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,...
The Black Art of Xbox Mods
The Black Art of Xbox Mods
The Xbox might be described as a powerful, proprietary PC that has been customized exclusively for running games. This book will help you to maximize the potential of your Xbox video game console by showing you how to modify your Xbox in various ways. You will learn how to disassemble your Xbox, right down to the motherboard, and you will...
Learning Ext JS 3.2
Learning Ext JS 3.2

The book provides plenty of fun example code and screenshots to guide you through the creation of examples to assist with learning. By taking a chapter-by-chapter look at each major aspect of the Ext JS framework, the book lets you digest the available features in small, easily understandable chunks, allowing you to start using the library...

Software Engineering: A Practitioner's Approach
Software Engineering: A Practitioner's Approach

When computer software succeeds—when it meets the needs of the people who use it, when it performs flawlessly over a long period of time, when it is easy to modify and even easier to use—it can and does change things for the better. But when software fails—when its users are dissatisfied, when it is error prone, when...

Cardiogenic Shock (Contemporary Cardiology)
Cardiogenic Shock (Contemporary Cardiology)

Leading world authorities drawn from cardiology, surgery, pediatrics, internal medicine, and basic science comprehensively survey the diagnostic, therapeutic, and prognostic aspects of cardiogenic shock. These experts describe the different scenarios leading to cardiogenic shock, the ways to diagnose their causes, the unique therapeutic...

Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
Education in Rwanda: Rebalancing Resources to Accelerate Post-Conflict Development and Poverty Reduction (World Bank Country Study)
Education in Rwanda: Rebalancing Resources to Accelerate Post-Conflict Development and Poverty Reduction (World Bank Country Study)
Ten years after the 1994 genocide in which an estimated 10 percent of the country’s population perished, Rwanda’s devastated education system is now back on its feet. Classrooms have been repaired and new ones built; teachers who fled the mayhem have been reintegrated into the teaching force; arrears in teacher pay have been cleared up;...
Helium Cryogenics (International Cryogenics Monograph Series)
Helium Cryogenics (International Cryogenics Monograph Series)

Twenty five years have elapsed since the original publication of Helium Cryogenics. During this time, a considerable amount of research and development involving helium fluids has been carried out culminating in several large-scale projects. Furthermore, the field has matured through these efforts so that there is now a broad...

Designing Enterprise Applications with the Java(TM) 2 Platform (Enterprise Edition)
Designing Enterprise Applications with the Java(TM) 2 Platform (Enterprise Edition)

The Java 2 Platform, Enterprise Edition, offers enterprise developers a simplified, component-based approach to creating applications for both intranets and the Internet.

Created by the Enterprise Team of the Java Software group at Sun Microsystems, Designing Enterprise Applications with the Java™ 2 Platform, Enterprise Edition...

Intellectual Property: The Law of Trademarks, Copyrights, Patents, and Trade Secrets for the Paralegal
Intellectual Property: The Law of Trademarks, Copyrights, Patents, and Trade Secrets for the Paralegal

The field of intellectual property (typically referred to as IP) is one that continues its rapid growth. Just a few years ago, individuals who identifi ed themselves as practitioners in the fi eld of intellectual property were met with blank stares. Now IP professionals are in constant demand, and it is a rare issue of any legal newspaper...

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy