Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cloud Capacity Management (Expert's Voice in Information Technology)
Cloud Capacity Management (Expert's Voice in Information Technology)

Cloud Capacity Management helps readers in understanding what the cloud, IaaS, PaaS, SaaS are, how they relate to capacity planning and management  and which stakeholders are involved in delivering value in the cloud value chain. It explains the role of capacity management for a creator, aggregator, and consumer of cloud...

Practical Business Analytics Using SAS: A Hands-on Guide
Practical Business Analytics Using SAS: A Hands-on Guide

Practical Business Analytics Using SAS: A Hands-on Guide shows SAS users and businesspeople how to analyze data effectively in real-life business scenarios.

The book begins with an introduction to analytics, analytical tools, and SAS programming. The authors—both SAS, statistics, analytics, and big data...

Advanced Technical Analysis of ETFs: Strategies and Market Psychology for Serious Traders
Advanced Technical Analysis of ETFs: Strategies and Market Psychology for Serious Traders

A comprehensive book filled with technical analysis tools and strategies for the advanced ETF trader

Advanced Technical Analysis of ETFs is an important resource for sophisticated ETF traders that contains a wealth of expanded strategies for technical trade setups and includes the author's best real trade examples...

Practical JSF in Java EE 8
Practical JSF in Java EE 8

Master the Java EE 8 and JSF (JavaServer Faces) APIs and web framework with this practical, projects-driven guide to web development. This book combines theoretical background with a practical approach by building four real-world applications. By developing these JSF web applications, you'll take a tour through the other...

Handbook of Popular Culture and Biomedicine: Knowledge in the Life Sciences as Cultural Artefact
Handbook of Popular Culture and Biomedicine: Knowledge in the Life Sciences as Cultural Artefact

This handbook explores the ways biomedicine and pop culture interact while simultaneously introducing the reader with the tools and ideas behind this new field of enquiry. From comic books to health professionals, from the arts to genetics, from sci-fi to medical education, from TV series to ethics, it offers different...

Flash Enabled: Flash Design and Development for Devices
Flash Enabled: Flash Design and Development for Devices

Flash Enabled guides Flash designers & developers in creating content and applications for multiple devices with Flash and other tools. Focusing on the Pocket PC platform, this book also discusses considerations in developing Flash for set-top box systems, cell phones, and lays the...

Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)
Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)

This is a book about patterns for resource management in software systems. The patterns provide solutions for problems that are typically encountered by software architects and developers when trying to provide an effective and efficient means of managing resources in a software system. Efficient management of resources is critical in the...

Integration of ICT in Smart Organizations
Integration of ICT in Smart Organizations
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
Accessible Technology in Today's Business (Cpg-Other)
Accessible Technology in Today's Business (Cpg-Other)
Microsoft is dedicated to developing technology that is useable and accessible to all. In ACCESSIBLE TECHNOLOGY IN TODAY'S BUSINESS, business managers discover how to utilize the built-in accessibility features in Microsoft products to meet the needs and preferences of people with disabilities. The book identifies the assistive technology features...
unlimited object storage image
Result Page: 287 286 285 284 283 282 281 280 279 278 277 276 275 274 273 272 271 270 269 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy