Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu
Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu

This book constitutes the refereed proceedings of the 6th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2011, held in Chengdu, China, in August 2011. The 26 revised full papers and 13 invited papers presented were carefully reviewed and selected from numerous submissions. The papers address all...

Innovations in Rehabilitation Sciences Education: Preparing Leaders for the Future
Innovations in Rehabilitation Sciences Education: Preparing Leaders for the Future
The genesis of this book arose from our educational consultations with many physiotherapy and occupational therapy colleagues around the world. In the course of presenting workshops that were primarily focused on problem-based learning (PBL), it became very clear to us that educators in the rehabilitation sciences were very...
Building Products for the Enterprise: Product Management in Enterprise Software
Building Products for the Enterprise: Product Management in Enterprise Software

If you’re new to software product management or just want to learn more about it, there’s plenty of advice available—but most of it is geared toward consumer products. Creating high-quality software for the enterprise involves a much different set of challenges. In this practical book, two expert product managers...

Data Analysis with Python: A Modern Approach
Data Analysis with Python: A Modern Approach

Learn a modern approach to data analysis using Python to harness the power of programming and AI across your data. Detailed case studies bring this modern approach to life across visual data, social media, graph algorithms, and time series analysis.

Key Features

  • Bridge your data analysis...
IT Administrator's Top Ten Introductory Scripts for Windows (Administrator's Advantage Series)
IT Administrator's Top Ten Introductory Scripts for Windows (Administrator's Advantage Series)
A key problem with Microsoft Windows is that its friendly user interface can get in the way of efficient system administration. There's no easy way, for example, to use the graphical administration tools to determine which of your users have passwords that will soon expire. The answers to such problems of administration come in the form of scripts...
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Build, secure, scale, and maintain Citrix on Windows

New and existing Citrix engineers will learn to design and deploy an enterprise-level server-based computing (SBC) environment on Windows Server 2003 using Citrix Access Suite 4.0. This official guide explains how to maximize the suite components to enable and...

Encyclopedia of Knowledge Management
Encyclopedia of Knowledge Management
The Encyclopedia of Knowledge Management is the most comprehensive source of coverage related to the past, present, and emerging directions of knowledge management. Edited by the well-respected knowledge management researcher, Professor David Schwartz of Bar Ilan University (Israel), the Encyclopedia of Knowledge Management provides a broad basis...
How Not to Program in C++: 111 Broken Programs and 3 Working Ones, or Why Does 2+2=5986
How Not to Program in C++: 111 Broken Programs and 3 Working Ones, or Why Does 2+2=5986
". . . a unique book that is fun to read while still providing valuable information." -- CodeGuru.com

". . .[like] cross training with the drill sergeant of debugging. . ." -- Chris Pelsor, Flash Developer

"If you have been programming in C++ for a while, this book is and excellent
...
IPv6 for Enterprise Networks (Networking Technology)
IPv6 for Enterprise Networks (Networking Technology)

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world...

Designing with Web Standards (3rd Edition)
Designing with Web Standards (3rd Edition)

Best-selling author, designer, and web standards evangelist Jeffrey Zeldman has revisited his classic, industry-shaking guidebook. Updated in collaboration with co-author Ethan Marcotte, this third edition covers improvements and challenges in the changing environment of standards-based design.

Written in the same engaging
...

Expert SQL Server Transactions and Locking: Concurrency Internals for SQL Server Practitioners
Expert SQL Server Transactions and Locking: Concurrency Internals for SQL Server Practitioners
Some time ago, one of my colleagues asked me, “What do you like about SQL Server the most?” I had heard this question many times before, and so I provided my usual answer: “SQL Server Internals. I like to understand how the product works and solve complex problems with this knowledge.”

His
...
unlimited object storage image
Result Page: 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 199 198 197 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy