Home | Amazing | Today | Tags | Publishers | Years | Search 
Cisco ASA Configuration (Networking Professional's Library)
Cisco ASA Configuration (Networking Professional's Library)
Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of...
Utilizing Open Source Tools for Online Teaching and Learning: Applying Linux Technologies
Utilizing Open Source Tools for Online Teaching and Learning: Applying Linux Technologies
It is necessary for online teaching designers and developers to understand the roles played by open source products in developing and supporting an online learning system.

Utilizing Open Source Tools for Online Teaching and Learning: Applying Linux Technologies covers strategies on using and evaluating open source products...

Elements of Programming
Elements of Programming
Elements of Programming provides a different understanding of programming than is presented elsewhere. Its major premise is that practical programming, like other areas of science and engineering,must be based on a solid mathematical foundation. The book shows that algorithms implemented in a real programming language,...
Programming WCF Services
Programming WCF Services
Programming WCF Services is the authoritative, bestselling introduction to Microsoft's unified platform for developing service-oriented applications (SOA) on Windows. Hailed as the most definitive treatment of WCF available, this relentlessly practical book provides insight, not documentation, to help you learn the topics and skills you...
Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
The Adobe Photoshop CS4 Layers Book: Harnessing Photoshop's most powerful tool
The Adobe Photoshop CS4 Layers Book: Harnessing Photoshop's most powerful tool

Master Photoshop CS4 with this visual, hands-on guide to using Layers, under the expert guidance of digital imaging specialist Richard Lynch. Layers, Photoshop's most powerful feature, is the core of a nondestructive image-editing work flow.

Step-by-step instructions and practical examples illustrate how to .

* Polish: correct...

Credit and Community: Working-Class Debt in the UK since 1880
Credit and Community: Working-Class Debt in the UK since 1880
Credit's centrality to the current economic crisis makes the publication of Sean O'Connell's social history of working-class credit consumption particularly timely. Although the credit crunch came too late to be included in this book, the portrait of a complex relationship between lenders and borrowers over the past 120 years should be required...
CompTIA Network+ Certification Study Guide, Fourth Edition (Certification Press)
CompTIA Network+ Certification Study Guide, Fourth Edition (Certification Press)
If you are new to certifications, we have some good news and some bad news. The good news is that a computer industry certification is one of the most valuable credentials you can earn. It sets you apart from the crowd and marks you as a valuable asset to your employer. You will gain the respect of your peers, and certification can have a...
Practical Risk Management
Practical Risk Management
In early 1995 people were glued to their television sets watching the aftermath of a very large earthquake in the city of Kobe in western Japan. Little did they suspect the deep-seated implications of this event on the financial markets in general, and on the Bank of England in particular. The earthquake caused a major sell-off in the already...
An Introduction to Mathematical Models in Ecology and Evolution: Time and Space (Ecological Methods and Concepts)
An Introduction to Mathematical Models in Ecology and Evolution: Time and Space (Ecological Methods and Concepts)
Students often find it difficult to grasp fundamental ecological and evolutionary concepts because of their inherently mathematical nature. Likewise, the application of ecological and evolutionary theory often requires a high degree of mathematical competence.

This book is a first step to addressing these difficulties, providing a broad...

Stop the Screaming: How to Turn Angry Conflict With Your Child into Positive Communication
Stop the Screaming: How to Turn Angry Conflict With Your Child into Positive Communication
I wrote Stop the Screaming in order to help parents better understand and resolve conflicts with their children and adolescents. Not abusive or violent, these are the conflicts that arise in the normal course of family life. They happen at any time or on any occasion—during play, at family meals, and even on vacations. They are typically...
Anisotropic diffusion in image processing
Anisotropic diffusion in image processing
Many recent techniques for digital image enhancement and multiscale image representations are based on nonlinear partial differential equations (PDEs).

This book gives an introduction to the main ideas behind these methods, and it describes in a systematic way their theoretical foundations, numerical aspects, and applications. A large
...
Result Page: 827 826 825 824 823 822 821 820 819 818 817 816 815 814 813 812 811 810 809 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy