Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISSP All-in-One Exam Guide, 6th Edition
CISSP All-in-One Exam Guide, 6th Edition

A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris

Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by...

Tracking the Neolithic House in Europe: Sedentism, Architecture and Practice (One World Archaeology)
Tracking the Neolithic House in Europe: Sedentism, Architecture and Practice (One World Archaeology)

The Neolithic period is noted primarily for the change from hunter-gatherer societies to agriculture, domestication and sedentism. This change has been studied in the past by archaeologists observing the movements of plants, animals and people. But has not been examined by looking at the domestic architecture of the time. Along with tracking...

Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
This volume provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information...
Public Libraries and the Internet: Roles, Perspectives, and Implications
Public Libraries and the Internet: Roles, Perspectives, and Implications

The integration of technology into public library services has been a continual process across the eighteenth, nineteenth, twentieth, and twenty-first centuries, in which libraries have responded to new technologies, altering the ways that information could be recorded, accessed, and used. The Internet is a prominent recent example,...

HL7 for BizTalk
HL7 for BizTalk

HL7 for BizTalk provides a detailed guide to the planning and delivery of a HL7-compliant system using the dedicated Microsoft BizTalk for HL7 Accelerator. The HL7 Primary Standard, its various versions, and the use of the HL7 Accelerator for BizTalk are broken out and fully explained. HL7 for BizTalk provides clear guidance...

Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Get SQL Server up and running on the Linux operating system and containers. No database professional managing or developing SQL Server on Linux will want to be without this deep and authoritative guide by one of the most respected experts on SQL Server in the industry. Get an inside look at how SQL Server for Linux works through the...
The Concept of Number: From Quaternions to Monads and Topological Fields (Mathematics and Its Applications)
The Concept of Number: From Quaternions to Monads and Topological Fields (Mathematics and Its Applications)
This book consists of lectures that I have given, in Darmstadt since 1974, under various titles, for beginners or students of the third semester.

I have tried to concentrate on those themes concerning numbers, which seem to me to be the most important on essential and historical grounds, and which in my opinion
...
Introduction to Real Analysis: An Educational Approach
Introduction to Real Analysis: An Educational Approach

An accessible introduction to real analysis and its connection to elementary calculus

Bridging the gap between the development and history of real analysis, Introduction to Real Analysis: An Educational Approach presents a comprehensive introduction to real analysis while also offering a survey of the field. With its...

Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
PLAN, INSTALL, CONFIGURE, SECURE, OPTIMIZE AND TROUBLESHOOT! Citrix MetaFrame is the de facto standard for hosting and delivering applications from Windows-based servers. Citrix MetaFrame Presentation Server 3.0 is optimized for performance under Windows Server 2003, particularly Terminal Services. This book covers all the topics...
Introduction to Real Analysis (2nd Edition)
Introduction to Real Analysis (2nd Edition)

This text is a single variable real analysis text, designed for the one-year course at the junior, senior, or beginning graduate level. It provides a rigorous and comprehensive treatment of the theoretical concepts of analysis. The book contains most of the topics covered in a text of this nature, but it also includes many...

Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy