Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started
Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started

Become a Linux sysadmin and expert user of Linux, even with no previous Linux experience and learn to manage complex systems with ease.  Volume 1 of this three volume training course introduces operating systems in general and Linux in particular. It briefly explores the The Linux Philosophy for SysAdmins in preparation for the...

Communications and Networking: 13th EAI International Conference, ChinaCom 2018, Chengdu, China, October 23-25, 2018, Proceedings (Lecture Notes of ... and Telecommunications Engineering)
Communications and Networking: 13th EAI International Conference, ChinaCom 2018, Chengdu, China, October 23-25, 2018, Proceedings (Lecture Notes of ... and Telecommunications Engineering)
The book constitutes the refereed proceedings of the 13th EAI International Conference on Communications and Networking, held in October 2018 in Chengdu, China. The 71 papers presented were carefully selected from 114 submissions. The papers are organized in topical sections on wireless communications and networking, next...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum computers will revolutionize the way telecommunications networks function.

Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment....

Strategic Employee Communication: Building a Culture of Engagement
Strategic Employee Communication: Building a Culture of Engagement

Employee engagement (or a lack thereof) can often be linked to poor communication and a detachment from company goals. Companies of all sizes are looking for ways to boost communication, recognizing its impact on key business outcomes, such as productivity and profitability.

This book offers fresh insights about...

Cloud Computing Bible
Cloud Computing Bible

In the five months that I have been researching and writing Cloud Computing Bible, it has become clear to me that most people recognize that cloud computing is a big deal, even if they are not really clear why that is so. Every day newspaper and magazine articles and radio and TV stories report on cloud computing. The phrase “in the...

EDGE for Mobile Internet
EDGE for Mobile Internet
This ground-breaking resource offers you a detailed treatment of EDGE and its critical role in the development of the mobile Internet. The book explains how this global radio based high-speed mobile data standard can be introduced into GSM/GPRS networks, improving data transmission speeds to support multimedia services. It enables you to become...
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 (Lecture Notes on Data Engineering and Communications Technologies)
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 (Lecture Notes on Data Engineering and Communications Technologies)

This book discusses data communication and computer networking, communication technologies and the applications of IoT (Internet of Things), big data, cloud computing and healthcare informatics. It explores, examines and critiques intelligent data communications and presents inventive methodologies in communication technologies and...

Randomized Algorithms for Analysis and Control of Uncertain Systems: With Applications (Communications and Control Engineering)
Randomized Algorithms for Analysis and Control of Uncertain Systems: With Applications (Communications and Control Engineering)

The presence of uncertainty in a system description has always been a critical issue in control. The main objective of Randomized Algorithms for Analysis and Control of Uncertain Systems, with Applications (Second Edition) is to introduce the reader to the fundamentals of probabilistic methods in the analysis and design of...

Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
"He has written an excellent book that belongs in your personal library." Cryptologia

"Churchhouse (emer., Cardiff Univ., Wales) offers a history and explanation of codes, ciphers, cryptography, and cryptanalysis from Julius Caesar and WWII code-breaking activities to the present day including the world of the Internet.
...
Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Result Page: 147 146 145 144 143 142 141 140 139 138 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy