Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
National Security (Information Plus Reference Series)
National Security (Information Plus Reference Series)
National Security is part of the Information Plus Reference Series. The purpose of each volume of the series is to present the latest facts on a topic of pressing concern in modern American life. These topics include today’s most controversial and most studied social issues: abortion, capital punishment, care for the elderly, crime, the...
D3.js in Action
D3.js in Action

Summary

D3.js in Action is a practical tutorial for creating interactive graphics and data-driven applications using D3.js. You'll start with in-depth explanations of D3's out-of-the-box layouts, along with dozens of practical use cases that align with different types of visualizations. Then,...

A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Learning Python Testing
Learning Python Testing

A straightforward and easy approach to testing your Python projects

About This Book

  • Develop your knowledge and skills to increase your confidence in tackling new challenges
  • Guides you through the tools of automated testing in Python 3 with practical and real-life examples
  • ...
Data Integration: The Relational Logic Approach
Data Integration: The Relational Logic Approach

Data integration is a critical problem in our increasingly interconnected but inevitably heterogeneous world. There are numerous data sources available in organizational databases and on public information systems like the World Wide Web. Not surprisingly, the sources often use different vocabularies and different data structures, being...

Civil Resistance and Power Politics: The Experience of Non-violent Action from Gandhi to the Present
Civil Resistance and Power Politics: The Experience of Non-violent Action from Gandhi to the Present

Civil resistance--non-violent action against such challenges as dictatorial rule, racial discrimination and foreign military occupation--is a significant but inadequately understood feature of world politics. Especially through the peaceful revolutions of 1989, it has helped to shape the world we live in.

Civil Resistance
...

Expert Scripting and Automation for SQL Server DBAs
Expert Scripting and Automation for SQL Server DBAs
As the ratio of DBAs to supported instances and supported databases continues to drop, DBAs must look to automation, to allow them to continue to improve or, in some cases, even offer the same level of service to the business as they have historically. This book attempts to give DBAs the tools they need to implement strategic...
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security...

Database Programming With C#
Database Programming With C#

Non-VB programmers are shown how they can have the same database ease that Visual Basic programmers have: step-by-step coverage of data access in Visual Studio .NET, with example code in C#.

SERVER-SIDE PROCESSING, which is when you let a server process your queries and the like, is probably a concept you have heard of and...

bash Cookbook: Solutions and Examples for bash Users
bash Cookbook: Solutions and Examples for bash Users

Every modern operating system has at least one shell and some have many. Some shells are command-line oriented, such as the shell discussed in this book. Others are graphical, like Windows Explorer or the Macintosh Finder. Some users will interact with the shell only long enough to launch their favorite application, and then never emerge from...

Mastering VMware Horizon 6
Mastering VMware Horizon 6

Unlock the advanced features and full power of VMware Horizon 6 to deliver the industry's most comprehensive end-to-end user experience

About This Book

  • Learn why a EUC strategy is important, what it can deliver, and the approach you should take when starting out with your own project
  • ...
Business Analysis and Valuation: Using Financial Statements, Text and Cases
Business Analysis and Valuation: Using Financial Statements, Text and Cases

This text is divided into separate learning parts that cover both the why and how of accounting. For use after the intermediate accounting course, this book supplies cases based on real world applications, appropriate for graduate students, professionals and high-level undergraduate accounting students. It may also be used in a capstone...

unlimited object storage image
Result Page: 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy