Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Innovation in Information Technology
Innovation in Information Technology
The health of the computer science field and related disciplines has
been an enduring concern of the National Research Council’s Computer  cience and Telecommunications Board (CSTB). From its first reports in the late 1980s, CSTB has examined the nature, conduct, scope, and directions of the research that drives innovation in
...
Superfruits: (Top 20 Fruits Packed with Nutrients and Phytochemicals, Best Ways to Eat Fruits
Superfruits: (Top 20 Fruits Packed with Nutrients and Phytochemicals, Best Ways to Eat Fruits

“Paul Gross, the “Berry Doctor,” gets beyond the marketing hype on superfruits. By looking at nutrient density, research support and popular appeal, Gross delivers a cornucopia of offerings that can easily enhance well-being. Further, he includes ideas to add the nutrient-rich fruits into the diet, whether via simple...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Fundamentals of Risk and Insurance
Fundamentals of Risk and Insurance
This tenth edition of Fundamentals of Risk and Insurance marks the 36th anniversary of the first edition, published in 1972. Over the years, the book has undergone major change as the field of risk management and insurance has changed. Emmett J. Vaughan, an author in the first and all subsequent editions, guided the...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Pro Python System Administration
Pro Python System Administration

Pro Python System Administration, Second Edition explains and shows how to apply Python scripting in practice. It will show you how to approach and resolve real-world issues that most system administrators will come across in their careers. This book has been updated using Python 2.7 and Python 3 where appropriate....

Cisco CallManager Best Practices
Cisco CallManager Best Practices

Delivers the proven solutions that make a difference in your Cisco IP Telephony deployment

  • Learn dial plan best practices that help you configure features such as intercom, group speed dials, music on hold, extension mobility, and more

  • ...
Pilates and Conditioning for Athletes: An Integrated Approach to Performance and Recovery
Pilates and Conditioning for Athletes: An Integrated Approach to Performance and Recovery
Gain the competitive edge with the innovative training methods in Pilates and Conditioning for Athletes. This science-based, multidimensional approach to athletic conditioning helps you build a strong and flexible foundation by infusing Pilates into training, resulting in complete training programs that tap into the seven pillars of...
Pro Python System Administration
Pro Python System Administration

As time goes on, system administrators are presented with increasingly complicated challenges. In the early days, a team of engineers might have had to look after one or two systems. These days, one engineer can administer hundreds or thousands of systems.

System administrators are gradually replacing their tools with more advanced...

The Bully at Work: What You Can Do to Stop the Hurt and Reclaim Your Dignity on the Job
The Bully at Work: What You Can Do to Stop the Hurt and Reclaim Your Dignity on the Job

A landmark book that blazed light on one of the business world's dirtiest secrets, The Bully at Work exposed the destructive, silent epidemic of workplace bullying that devastates the lives, careers, and families of millions. In this completely updated new edition based on an updated survey of workplace issues, the authors explore...

Complete Digital Design: A Comprehensive Guide to Digital Electronics and Computer System Architecture
Complete Digital Design: A Comprehensive Guide to Digital Electronics and Computer System Architecture
Digital systems are created to perform data processing and control tasks. What distinguishes one system from another is an architecture tailored to efficiently execute the tasks for which it was designed. A desktop computer and an automobile’s engine controller have markedly different attributes dictated by their unique requirements. Despite...
Tricks of the eBay Masters
Tricks of the eBay Masters

Ever wonder how eBay PowerSellers got to be so successful? Wonder no more. Tricks of the eBay Masters is full of advice and over 600 tricks from expert eBay users. They learned by doing and are now going to pass on their wisdom to you. Find out how to jazz up your auction listings with HTML, how to increase buyer traffic through key...

unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy