Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

Choosing an Open Source CMS: Beginner's Guide
Choosing an Open Source CMS: Beginner's Guide
There are many powerful Open Source Content Management Systems (CMSs) available to take the pain away from managing a web site. These systems are feature-rich, often easy to use, and free. Unfortunately, there are so many choices that it's tough to be sure which CMS is the right one for your needs. How can you be sure that you are selecting and...
A Developer's Guide to SQL Server 2005 (Microsoft .Net Development)
A Developer's Guide to SQL Server 2005 (Microsoft .Net Development)
Few technologies have been as eagerly anticipated as Microsoft SQL Server 2005. Now, two SQL Server insiders deliver the definitive hands-on guide--accurate, comprehensive, and packed with examples. A Developer's Guide to SQL Server 2005 starts where Microsoft's documentation, white papers, and Web...
Advances in Digital Government (Advances in Database Systems)
Advances in Digital Government (Advances in Database Systems)
Book Series: THE KLUWER INTERNATIONAL SERIES ON ADVANCES IN DATABASE SYSTEMS : Volume 26

Advances In Digital Government presents a collection of in-depth articles that addresses a representative cross-section of the matrix of issues involved in implementing digital government systems. These articles constitute a survey of both the technical and...

New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud
New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud

The increasing costs of creating and maintaining infrastructures for delivering services to consumers have led to the emergence of cloud based third party service providers renting networks, computation power, storage, and even entire software application suites. On the other hand, service customers demand competitive pricing, service level...

PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version...

A Decision Framework for Integrated Wetland-River Basin Management in a Tropical and Data Scarce Environment: UNESCO-IHE PhD Thesis
A Decision Framework for Integrated Wetland-River Basin Management in a Tropical and Data Scarce Environment: UNESCO-IHE PhD Thesis

Traditionally, wetlands were considered separately from river basin systems. However, nowadays it is becoming common practice to follow an integrated approach in wetland-riverine watershed analysis and management. Such approach requires not only adequate representations of all relevant bio-physical parameters, but also of socio-political and...

SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
The user's guide to best practices in improving and enhancing security in a SAP landscape.

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and
...
The HIPAA Program Reference Handbook
The HIPAA Program Reference Handbook
Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them the ramifications of HIPAA. Until now. The HIPAA...
Mobile Radio Network Design in the VHF and UHF Bands: A Practical Approach
Mobile Radio Network Design in the VHF and UHF Bands: A Practical Approach
An essential element of radio technology and propagation is how to use radio technology and knowledge of radio propagation to design a network that meets the needs of customers. Mobile Radio Network Design in the VHF and UHF Bands provides the technical and fundamental knowledge required for advanced mobile radio network design to...
Network Security Policies and Procedures (Advances in Information Security)
Network Security Policies and Procedures (Advances in Information Security)
Technology is progressing at an astounding pace, and many organizations are working so hard to implement the technologies they need to survive need to understand how their network security policies and procedures regimen fits into the picture.

As with all technology nowadays, the next significant change is already beginning to happen. As
...
Beginning JavaScript
Beginning JavaScript

The perennial bestseller returns with new details for using the latest tools and techniques available with JavaScript

JavaScript is the definitive language for making the Web a dynamic, rich, interactive medium. This guide to JavaScript builds on the success of previous editions and introduces you to many new advances in JavaScript...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy