Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fourth Edition
RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fourth Edition

This comprehensive, hands-on study guide gives you complete coverage of all objectives for the Red Hat Certified Linux Engineer exam (RH302), hundreds of review questions, and hands-on lab exercises.

Get the book that shows you not only what—but how—to study

  • 100% complete...
Sales Excellence: Systematic Sales Management (Management for Professionals)
Sales Excellence: Systematic Sales Management (Management for Professionals)

This book presents a very novel and strategic approach to Sales Management, an area that has suffered from a lack of sophistication in practice. This content-rich and thought-provoking book has a very unique positioning: It considers the sales performance of an organization at a very high, strategic level and offers specific guidance in...

Web Bloopers, First Edition : 60 Common Web Design Mistakes, and How to Avoid Them
Web Bloopers, First Edition : 60 Common Web Design Mistakes, and How to Avoid Them

Will your website pass the test? Or will site visitors be gnashing their teeth and shaking their fists? Will any customers ever come back to your site? Save yourself the embarrassment of being caught with your Web bloopers showing. Read this book and find out now if your website commits any heinous bloopers.

This book is not just about...

Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies
DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies

Explore the high-in demand core DevOps strategies with powerful DevOps tools such as Ansible, Jenkins, and Chef

Key Features

  • Get acquainted with methodologies and tools of the DevOps framework
  • Perform continuous integration, delivery, deployment, and monitoring using...
Grant Writing For Dummies
Grant Writing For Dummies

Learn to:

  • Navigate federal grant databases and apply online for grants
  • Find the most current public and private sector grant opportunities
  • Create strong statements of need
  • Submit applications that meet funders’ expectations

Your comprehensive...

Credible Checklists and Quality Questionnaires: A User-Centered Design Method
Credible Checklists and Quality Questionnaires: A User-Centered Design Method

Credible Checklists and Quality Questionnaires starts off with an examination of the critical but commonly overlooked checklist method.

In the second chapter, questionnaires and surveys are discussed. Asking questions sounds simple, but the hard truth is that asking questions (and designing questionnaires) is a...

CCNA Cisco Certified Network Associate Study Guide (Exam 640-802) (Certification Press)
CCNA Cisco Certified Network Associate Study Guide (Exam 640-802) (Certification Press)
The Best Fully Integrated Study System Available

With hundreds of practice questions and hands-on exercises, CCNA Cisco Certified Network Associate Study Guide covers what you need to know-and shows you how to prepare-for this challenging exam.

  • 100% complete coverage of all official...
The Project Manager's Toolkit (Computer Weekly Professional)
The Project Manager's Toolkit (Computer Weekly Professional)
'The Project Manager's Toolkit' provides a quick reference checklist approach to drive an IT development project as well as solve issues that arise in the process. It can be used proactively to set a project on the right course and reactively for solutions to problems.

It will:

* help identify what needs doing next on an IT
...
Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...

Database Systems: Design, Implementation, and Management (with Bind-In Printed Access Card)
Database Systems: Design, Implementation, and Management (with Bind-In Printed Access Card)

DATABASE SYSTEMS: DESIGN, IMPLEMENTATION, AND MANAGEMENT, NINTH EDITION, a market-leader for database texts, gives readers a solid foundation in practical database design and implementation. The book provides in-depth coverage of database design, demonstrating that the key to successful database implementation is in proper design of databases...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy