Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Through Data Analysis: Building Situational Awareness
Network Security Through Data Analysis: Building Situational Awareness

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what...

Nurse's Pocket Guide: Diagnoses, Prioritized Interventions, and Rationale 10th Editions
Nurse's Pocket Guide: Diagnoses, Prioritized Interventions, and Rationale 10th Editions

The American Nurses Association (ANA) Social Policy Statement of 1980 was the first to define nursing as the diagnosis and treatment of human responses to actual and potential health problems. This definition, when combined with the ANA Standards of Practice, has provided impetus and support for the use of nursing diagnosis. Defining nursing...

The Meditator's Handbook: A Comprehensive Guide to Eastern and Western Meditation Techniques
The Meditator's Handbook: A Comprehensive Guide to Eastern and Western Meditation Techniques

A clear and authoritative introduction to the different traditions of meditation by an authority in the field. Meditation is an extraordinarily powerful tool for physical and mental relaxation as well as for personal and spiritual growth. It has been practiced for thousands of years and today it continues to have serious relevance for an...

Yoga Exercises for Teens: Developing a Calmer Mind and a Stronger Body (SmartFun Activity Books)
Yoga Exercises for Teens: Developing a Calmer Mind and a Stronger Body (SmartFun Activity Books)
Yoga provides not only an excellent, low-impact workout, it also helps young people in key areas such as body awareness, flexibility, concentration, stress reduction, and self-expression. The exercises and games in this easy-to-follow guide are specifically designed to fit the needs of teenagers and to show teens how to work out and train...
ADSL Standards, Implementation, and Architecture (Advanced and Emerging Communications Technologies Series)
ADSL Standards, Implementation, and Architecture (Advanced and Emerging Communications Technologies Series)
With its promise of high speed Internet access, Asymmetric Digital Subscriber Line (ADSL) techniques are now making their way out of the laboratory and into the general consumer market. This creates the need for telecommunications professionals to have not just an awareness of the technology, but an in-depth understanding of its workings, its...
Clojure Data Structures and Algorithms Cookbook
Clojure Data Structures and Algorithms Cookbook

25 recipes to deeply understand and implement advanced algorithms in Clojure

About This Book

  • Explore various advanced algorithms and learn how they are used to address many real-world computing challenges
  • Construct elegant solutions using impressive techniques including zippers, parsing,...
The Underwater Photographer, Third Edition: Digital and Traditional Techniques
The Underwater Photographer, Third Edition: Digital and Traditional Techniques
A superb hand-on manual containing a wealth of underwater tips, hints and advice - all beautifully illustrated with brand new, full colour images.

Martin Edge, a leading authority on underwater photography, will help you capture stunning effects using his popular 'think and consider' system - offering a heightened awareness and
...
Contamination-Free Manufacturing for Semiconductors and Other Precision Products
Contamination-Free Manufacturing for Semiconductors and Other Precision Products
Provides advanced treatment and in-depth coverage of the origins, procedures, and disposal of contaminants in the manufacturing of semiconductors and other precision products. Offers solutions to inadequate areas of measurement capability and control technology, clarifying problems in the industry.

Semiconductor chip manufacturing, now a
...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes

Preparing for the Worst details the best practices in antiterrorism tactics and preparing for disaster. This book is for typical American families, business travelers, corporate executive management personnel, emergency first responders, school administrators, and local government officials responsible for public safety and emergency...

Be Your Own Coach: Your Pathway to Possibility (Crisp Fifty Minute Series)
Be Your Own Coach: Your Pathway to Possibility (Crisp Fifty Minute Series)

This book will show you how to recognize opportunities for personal and professional growth, define commitments to yourself and keep them, develop greater self-confidence and self-awareness, and understand the power of your feelings, moods, and reactions. It is possible for you to develop your own approach to learning and excel without the...

The Case for Virtual Business Processes : Reduce Costs, Improve Efficiencies, and Focus on Your Core Business
The Case for Virtual Business Processes : Reduce Costs, Improve Efficiencies, and Focus on Your Core Business

The dot-com collapse generally discredited the idea of leveraging the Internet to build viable businesses. Many market pundits have decried the concept without examining the underlying dynamics associated with these companies' failures. The truth is, prior business models were built on a flawed business case, not bad technology....

Result Page: 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy