Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Plone 3 Theming
Plone 3 Theming
Themes are among the most powerful features that can be used to customize a web site, especially in Plone. Using custom themes can help you brand your site for a particular corporate image; it ensures standards compliance and creates easily navigable layouts. But most Plone users still continue to use default themes as developing and deploying...
Meshing, Geometric Modeling and Numerical Simulation, Volume 2: Metrics, Meshes and Mesh Adaptation (Geometric Modeling and Applications)
Meshing, Geometric Modeling and Numerical Simulation, Volume 2: Metrics, Meshes and Mesh Adaptation (Geometric Modeling and Applications)

Triangulations, and more precisely meshes, are at the heart of many problems relating to a wide variety of scientific disciplines, and in particular numerical simulations of all kinds of physical phenomena. In numerical simulations, the functional spaces of approximation used to search for solutions are defined from meshes, and in...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Software Defined Radio: The Software Communications Architecture (Wiley Series in Software Radio)
Software Defined Radio: The Software Communications Architecture (Wiley Series in Software Radio)

The Software Communications Architecture (SCA) establishes an implementation-independent framework for the development of Joint Tactical Radio System software configurable radios. It specifies the Operating Environment, services and interfaces that applications use.

Software Defined Radio: The Software...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Professional DotNetNuke 5: Open Source Web Application Framework for ASP.NET (Wrox Programmer to Programmer)
Professional DotNetNuke 5: Open Source Web Application Framework for ASP.NET (Wrox Programmer to Programmer)
DotNetNuke creator Shaun Walker leads this superlative author team of MVPs while delivering the latest update of a bestseller. They offer complete coverage of the major revisions to DotNetNuke 5, such as more granular administration, widgets, XHTML compliance, improved social networking, workflow, and better content management. They thoroughly...
Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line
Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line

Reduce the environmental and budgetary impact of your IT infrastructure

This groundbreaking work offers a complete roadmap for integrating environmentally sound techniques and technologies into your Information Systems architecture. Green IT explains how to adopt a business-driven green initiative and provides a...

Doing Child and Adolescent Psychotherapy: Adapting Psychodynamic Treatment to Contemporary Practice
Doing Child and Adolescent Psychotherapy: Adapting Psychodynamic Treatment to Contemporary Practice
Almost 10 years ago I wrote a guide to child therapy. I worked hard, then, to make the book relevant, timely, and thorough. But a lot has happened over the past decade. The economics of mental health, a euphemism for managed care and insurance companies, have grown from supporters of what we do to dictators of it. Even as we meet...
Governance, Risk, and Compliance Handbook for Oracle Applications
Governance, Risk, and Compliance Handbook for Oracle Applications
  • Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
  • Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
  • ...
CCDA: Cisco Certified Design Associate Study Guide, Second Edition (Exam 640-861)
CCDA: Cisco Certified Design Associate Study Guide, Second Edition (Exam 640-861)

Here’s the book you need to prepare for Cisco’s revised CCDA exam, 640-861. This Study Guide provides:

  • In-depth coverage of every CCDA exam objective
  • Practical information on Cisco design solutions
  • Hundreds of challenging practice questions

Authoritative coverage of all...

Beyond Governance: Creating Corporate Value through Performance, Conformance and Responsibility
Beyond Governance: Creating Corporate Value through Performance, Conformance and Responsibility
T oday’s finance professionals face a very different world to
their predecessors. The steady, planned and predictable
world of the accountant has been changed beyond
measure, by a number of pressures including:

. corporate scandals and the consequent intense focus on
corporate governance and risk management;...
MCTS 70-662 Rapid Review: Configuring Microsoft Exchange Server 2010
MCTS 70-662 Rapid Review: Configuring Microsoft Exchange Server 2010
This Rapid Review is designed to help you assess—and complete—your readiness for MCTS exam 70-662: Microsoft Exchange Server 2010, Configuring. The Rapid Review series is intended for exam candidates who already have a solid grasp on the exam objectives through a combination of experience, skills, and...
unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy