Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Energy and Environmental Security in Developing Countries (Advanced Sciences and Technologies for Security Applications)
Energy and Environmental Security in Developing Countries (Advanced Sciences and Technologies for Security Applications)

This book presents a comprehensive account of the energy and environmental security perspectives of the developing countries. To address the subject comprehensively, it covers four geographically diverse clusters of developing countries from across the world. The regions particularly focused on are: South Asia, South East Asia, Sub...

Reality Check: How Immersive Technologies Can Transform Your Business
Reality Check: How Immersive Technologies Can Transform Your Business

Discover THE next big competitive advantage in business: learn how augmented and virtual reality can put your business ahead.

Augmented reality (AR) and virtual reality (VR) are part of a new wave of immersive technologies that offer huge opportunities for businesses, across industries and regardless of
...

The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
The foremost "how-to" guide to SOA

Service-Oriented Architecture (SOA) is at the heart of a revolutionary computing platform that is being adopted world-wide and has earned the support of every major software provider. In Service-Oriented Architecture: Concepts,...

Professional SQL Server 2000 Database Design
Professional SQL Server 2000 Database Design
SQL Server 2000 is the latest and most powerful version of Microsoft's data warehousing and relational database management system.

Professional SQL Server 2000 Database Design provides an outline of the techniques that the designer can employ to make effective use of the full range of facilities that SQL Server 2000 offers. It attempts to move...

Microsoft Office Excel 2007: The L Line, The Express Line to Learning
Microsoft Office Excel 2007: The L Line, The Express Line to Learning
Get on the fast track to mastering Excel

Want to find success in your profession or business? Master the timesaving tools you'll need in the real world, like Excel 2007. Whether you're a student, a professional, or an entrepreneur, you can learn Excel with this start-to-finish guide. Gain solid skills as you go from station...

Optical System Design, Second Edition
Optical System Design, Second Edition
Learn advanced optical design techniques from the field's most respected guide

Honed for more than 20 years in an SPIE professional course taught by renowned optical systems designer Robert E. Fischer, Optical System Design, Second Edition brings you the latest cutting-edge design techniques and more than 400 detailed...

Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design)
Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design)

The computing world today is in the middle of a revolution: mobile clients and cloud computing have emerged as the dominant paradigms driving programming and hardware innovation today. The Fifth Edition of Computer Architecture focuses on this dramatic shift, exploring the ways in which software and technology in the cloud are accessed...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Gitolite Essentials
Gitolite Essentials

Leverage powerful branch and user access control with Git for your own private collaborative repositories

Overview

  • Learn to manage the many repositories and the users accessing these repositories in the Git server
  • Walks you through the most important ideas and concepts in Gitolite supported...
Hadoop: The Definitive Guide
Hadoop: The Definitive Guide

Discover how Apache Hadoop can unleash the power of your data. This comprehensive resource shows you how to build and maintain reliable, scalable, distributed systems with the Hadoop framework -- an open source implementation of MapReduce, the algorithm on which Google built its empire. Programmers will find details for analyzing...

Foundations of Multithreaded, Parallel, and Distributed Programming
Foundations of Multithreaded, Parallel, and Distributed Programming

Greg Andrews teaches the fundamental concepts of multithreaded, parallel and distributed computing and relates them to the implementation and performance processes. He presents the appropriate breadth of topics and supports these discussions with an emphasis on performance. Features *Emphasizes how to solve problems, with correctness the...

unlimited object storage image
Result Page: 285 284 283 282 281 280 279 278 277 276 275 274 273 272 271 270 269 268 267 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy