Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The effective management of risks online is likely to be the greatest business enabler / destroyer of the next decade. Clearly, organizations that do not move to full e-commerce functionality are unlikely to flourish; whereas those that ignore cyber crime and the "dark side" of the Internet are likely to get badly burnt.

This...

Youth, Inequality and Social Change in the Global South (Perspectives on Children and Young People, 6)
Youth, Inequality and Social Change in the Global South (Perspectives on Children and Young People, 6)
This book gathers international and interdisciplinary work on youth studies from the Global South, exploring issues such as continuity and change in youth transitions from education to work; contemporary debates on the impact of mobility, marginalization and violence on young lives; how digital technologies shape youth experiences; and...
Schaum's Outline of Advanced Calculus, Third Edition (Schaum's Outline Series)
Schaum's Outline of Advanced Calculus, Third Edition (Schaum's Outline Series)

Tough Test Questions? Missed Lectures? Not Enough Time?

Fortunately for you, there's Schaum's.

More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Outline presents all...

A Radical Approach to Real Analysis: Second Edition (Mathematical Association of America Textbooks)
A Radical Approach to Real Analysis: Second Edition (Mathematical Association of America Textbooks)

In the second edition of this MAA classic, exploration continues to be an essential component. More than 60 new exercises have been added, and the chapters on Infinite Summations, Differentiability and Continuity, and Convergence of Infinite Series have been reorganized to make it easier to identify the key ideas. A Radical Approach to Real...

Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
In 2005, the U.S. Government Accountability Office recommended that all agencies begin planning a coherent transition to IPv6. IPv6 will solve the problem of limited IP addresses and improve internetworking capabilities. This promising protocol is gaining momentum and it is only a matter of time before the transition will have to occur globally....
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

Numerical Recipes in C: The Art of Scientific Computing, Second Edition
Numerical Recipes in C: The Art of Scientific Computing, Second Edition
Our aim in writing the original edition of Numerical Recipes was to provide a
book that combined general discussion, analytical mathematics, algorithmics, and
actual working programs. The success of the first edition puts us now in a difficult,
though hardly unenviable, position. We wanted, then and now, to write a book
that is
...
GenXpat: The Young Professional's Guide To Making A Successful Life Abroad
GenXpat: The Young Professional's Guide To Making A Successful Life Abroad
"The first book to deal specifically with the 'GenXpat' generation - the 25-39 age group that typically sets off for the expatriate life when career is their primary consideration. This is my kind of book - it's informative, practical, and you get a real sense that the author knows what she is talking about." Ian Burns of Blackwell's...
Real Analysis
Real Analysis

This book is written by award-winning author, Frank Morgan. It offers a simple and sophisticated point of view, reflecting Morgan's insightful teaching, lecturing, and writing style. Intended for undergraduates studying real analysis, this book builds the theory behind calculus directly from the basic concepts of real numbers, limits, and...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach
Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach

This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment

Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book...

CISSP All-in-One Exam Guide, 6th Edition
CISSP All-in-One Exam Guide, 6th Edition

A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris

Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy