Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
An Atlas of Gynecologic Oncology
An Atlas of Gynecologic Oncology

While there are a plethora of practical texts relating to general gynecology, there are few specific to gynecological oncology. Taking a "cookbook" approach with clearly written and pictorial instructions, Atlas of Gynecologic Oncology: Investigation and Surgery describes and illustrates important procedures in the repertoire of a...

Business Continuity and Disaster Recovery for InfoSec Managers
Business Continuity and Disaster Recovery for InfoSec Managers
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of
...
MCITP Self-Paced Training Kit (Exam 70-647): Windows Server 2008 Enterprise Administrator
MCITP Self-Paced Training Kit (Exam 70-647): Windows Server 2008 Enterprise Administrator
This training kit is designed for enterprise administrators who have several years’ experience managing the overall IT environment and architecture of medium to large organizations and who plan to take the Microsoft Certified Information Technology Professional (MCITP) 70-647 exam. As an enterprise...
Disaster Recovery Gotchas - Watch Out For These Common Mistakes!
Disaster Recovery Gotchas - Watch Out For These Common Mistakes!

Information is power - you know that. But, how do you research the best Disaster Recovery strategies, without spending too much of your time (and money) on it? The average person earns $ 1100 per week, which equates to $ 27 per hour. Trying to do the research yourself would take you at least 5 hours to come up with the best information, AND...

Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

MATLAB Symbolic Algebra and Calculus Tools
MATLAB Symbolic Algebra and Calculus Tools

MATLAB is a high-level language and environment for numerical computation, visualization, and programming. Using MATLAB, you can analyze data, develop algorithms, and create models and applications. The language, tools, and built-in math functions enable you to explore multiple approaches and reach a solution faster than with spreadsheets or...

Design of Reinforced Concrete Silo Groups (Building Pathology and Rehabilitation)
Design of Reinforced Concrete Silo Groups (Building Pathology and Rehabilitation)

This book offers a new calculation procedure of the structural behavior of grouped layout of silos, easy to use and with satisfactory responses.

Groups of reinforced concrete silos are structures commonly used in the food industry, where it is usually necessary to separate the storage of different types and sources of...

Technologies of International Relations: Continuity and Change
Technologies of International Relations: Continuity and Change

This book examines the role of technology in the core voices for International Relations theory and how this has shaped the contemporary thinking of ‘IR’ across some of the discipline’s major texts. Through an interview format between different generations of IR scholars, the conversations of the book analyse the...

CISSP Training Kit
CISSP Training Kit

Your 2-in-1 Self-Paced Training Kit

EXAM PREP GUIDE

Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying
...

Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
Database Systems: Design, Implementation, and Management
Database Systems: Design, Implementation, and Management

For many reasons, few books survive to reach their eighth edition. Authors and publishers who let the success of their earlier work produce the comfort of complacency usually pay the price of watching the marketplace dismantle their creations. This database systems book has been successful through seven editions because we–the...

Phenomenology of Life - From the Animal Soul to the Human Mind: Book II. The Human Soul in the Creative Transformation of the Mind
Phenomenology of Life - From the Animal Soul to the Human Mind: Book II. The Human Soul in the Creative Transformation of the Mind
The human condition comes into its own only, as we have pointed out before,1 when Imaginatio Creatrix emerges and progressively reaches the realization of its full potential, bringing in the freedom to interrogate and the powers of creative invention.

When we come to stand back and ponder it, we are amazed at how the ontopoietic
...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy