Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

Leading at a Higher Level, Revised and Expanded Edition: Blanchard on Leadership and Creating High Performing Organizations
Leading at a Higher Level, Revised and Expanded Edition: Blanchard on Leadership and Creating High Performing Organizations

"Leading at a Higher Level makes clear that respect and integrity aren’t pleasant-sounding options; they are essential criteria for an organization’s survival. As inspiring as it is instructive, this book belongs in every leader’s core curriculum."

...

Discrete, Continuous, and Hybrid Petri Nets
Discrete, Continuous, and Hybrid Petri Nets

Petri Nets were introduced and still successfully used to analyze and model discrete event systems especially in engineering and computer sciences such as in automatic control.

Recently this discrete Petri Nets formalism was successfully extended to continuous and hybrid systems. This monograph presents a well written and clearly...

Discovering Computers 2011: Complete (Shelly Cashman)
Discovering Computers 2011: Complete (Shelly Cashman)

Discovering Computers 2011: Complete, provides learners with a current and thorough introduction to computers by integrating the use of technology with the printed text.

The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud of the fact that the previous fi fteen editions of this textbook...

JavaScript Step by Step
JavaScript Step by Step

Much has changed since the first edition of JavaScript Step by Step was written in 2007. The underlying JavaScript specification received a major update; Microsoft released Windows Internet Explorer 8—and now 9 (which is about to be released as I write this); JavaScript development frameworks have matured and are now ubiquitous; and...

Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

Microsoft Outlook for Mac 2011 Step by Step (Step By Step (Microsoft))
Microsoft Outlook for Mac 2011 Step by Step (Step By Step (Microsoft))

The smart way to learn Microsoft® Outlook® 2011 for Mac—one step at a time!

Experience learning made easy—and quickly teach yourself how to organize your email, arrange your calendar, and manage tasks using Outlook on your Mac. With Step by Step, you set the pace—building and practicing the...

Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)
Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)

With more than 400 million active users and growing, it’s hard to ignore the buzz about Facebook. It’s a hot topic these days, and shows no signs of letting up. If you’re ready to get to the bottom of this Internet sensation and find out how to use this social networking phenomenon for yourself,...

Windows 7 Inside Out, Deluxe Edition
Windows 7 Inside Out, Deluxe Edition

By some measures, Windows 7 sets a new standard for usability. It needs less out-of-the-box tweaking and troubleshooting than any Windows version we’ve ever used. The arrangement of folders and files in Windows Explorer, basic system security, User Account Control settings, and numerous other default configuration options are...

Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications
Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications

Architect IBM® WebSphere® Applications for Maximum Performance, Security, Flexibility, Usability, and Value Successful, high-value WebSphere applications begin with effective architecture. Now, one of IBM’s leading WebSphere and WebSphere Portal architects offers a hands-on,...

Handbook of Educational Data Mining (CRC Data Mining and Knowledge Discovery Series)
Handbook of Educational Data Mining (CRC Data Mining and Knowledge Discovery Series)

The goal of this book is to provide an overview of the current state of knowledge of educational data mining (EDM). The primary goal of EDM is to use large-scale educational data sets to better understand learning and to provide information about the learning process. Although researchers have been studying human learning for over a...

Irrlicht 1.7 Realtime 3D Engine Beginner's Guide
Irrlicht 1.7 Realtime 3D Engine Beginner's Guide
The Irrlicht Engine is a cross-platform high-performance real-time 3D engine written in C++. It features a powerful high-level API for creating complete 3D and 2D applications such as games or scientific visualizations.

Irrlicht 1.7.1 Realtime 3D Engine Beginner's Guide will teach you to master all that is required to create 2D and...

unlimited object storage image
Result Page: 2243 2242 2241 2240 2239 2238 2237 2236 2235 2234 2233 2232 2231 2230 2229 2228 2227 2226 2225 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy