Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Organic Mass Spectrometry in Art and Archaeology
Organic Mass Spectrometry in Art and Archaeology

Early applications of chemical and physical analytical methods in studies on art materials and archaeological objects demonstrated that scientific investigation is an essential tool for acquiring information on the materials that make up an artwork and for assessing their decay, in order to plan restoration approaches. Chemical diagnosis,...

CCIE Security Practice Labs (CCIE Self-Study)
CCIE Security Practice Labs (CCIE Self-Study)

The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers,...

Ultra-Wideband Wireless Communications and Networks
Ultra-Wideband Wireless Communications and Networks
Ultra-wideband (UWB) technology has great potential for applications in wireless communications, radar and location. It has many benefits due to its ultra-wideband nature, which include high data rate, less path loss and better immunity to multipath propagation, availability of low-cost transceivers, low transmit power and low interference. Despite...
Novell Cluster Services for Linux and NetWare (Novell Press)
Novell Cluster Services for Linux and NetWare (Novell Press)

Need to configure or manage Novell Cluster Services on NetWare, Linux or a mixed environment? Pick up a copy of the official reference guide, Novell Cluster Services for Linux and NetWare. This book blends in-depth information with practical, real world examples to cover cluster services configuration...

LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Learning Cloudera Impala
Learning Cloudera Impala

Perform interactive, real-time in-memory analytics on large amounts of data using the massive parallel processing engine Cloudera Impala

Overview

  • Step-by-step guidance to get you started with Impala on your Hadoop cluster
  • Manipulate your data rapidly by writing proper SQL statements
  • ...
Hyper-V Replica Essentials
Hyper-V Replica Essentials

For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.

Overview

  • A practical step-by-step guide that goes beyond theory and...
The HP Virtual Server Environment: Making the Adaptive Enterprise Vision a Reality in Your Datacenter
The HP Virtual Server Environment: Making the Adaptive Enterprise Vision a Reality in Your Datacenter
Use HP virtualization to maximize IT service quality, agility, and value
  • Includes coverage of HP's new Integrity Virtual Machines, Global Workload Manager, Virtualization Manager, and Capacity Advisor

  • Plan, implement, and manage virtualization to drive maximum business...

Advances in Computer-Supported Learning
Advances in Computer-Supported Learning
The Internet and growth of computer networks have eliminated geographic barriers, creating an environment where education can be brought to a student no matter where that student may be. The success of distance learning programs and the availability of many Web-supported applications and multimedia resources have increased the effectiveness of...
Mastering PostgreSQL 10: Expert techniques on PostgreSQL 10 development and administration
Mastering PostgreSQL 10: Expert techniques on PostgreSQL 10 development and administration

Master the capabilities of PostgreSQL 10 to efficiently manage and maintain your database

Key Features

  • Your one-stop guide to mastering advanced concepts in PostgreSQL 10 with ease
  • Master query optimization, replication, and high availability with PostgreSQL
  • ...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 50 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy