Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing LINUX Step by Step
Securing LINUX Step by Step
This guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers,...
Getting a Business Loan: Financing Your Main Street Business
Getting a Business Loan: Financing Your Main Street Business

Every day,  Main Street businesses wrestle with the challenge of finding the cash to finance growth or use as working capital. The local banker often wants a credit score of 720, three or more years in business, and a fat savings account. No wonder local bankers approve only 10% of loan applications.

Getting a
...

Policy-based contracting in semantic web service markets
Policy-based contracting in semantic web service markets
Web services generalize the idea of the Web beyond the exchange of simple Web pages in order to enable the provision of a broad range of different services. By com- posing Web services, cross-organizational and collaborative business processes can be realized in a highly dynamic and flexible way, which is particularly important if...
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Collaborative Leadership: How to Succeed in an Interconnected World
Collaborative Leadership: How to Succeed in an Interconnected World

Collaborative leadership is about delivering results across boundaries. The nature of that boundary is important, whether it's a formal contract or an informal agreement between two parties to work together for a common aim. And leaders need to be clear about where the boundary lies and how to use the different capabilities on either side...

Solidity Programming Essentials: A beginner's guide to build smart contracts for Ethereum and blockchain
Solidity Programming Essentials: A beginner's guide to build smart contracts for Ethereum and blockchain

Learn the most powerful primary programming language for writing smart contracts and discover how to write, deploy, and test smart contracts in Ethereum

Key Features

  • Get up and running with the Solidity programming language
  • Use Solidity as a scripting language to build...
How to Plan, Contract and Build Your Own Home
How to Plan, Contract and Build Your Own Home
The Classic Blueprint for Do-It-Yourself Homebuilders Updated to Reflect the Latest Materials, Techniques, and Options!

Covering everything from hiring the right vendors to choosing fixtures, this information-packed guide is a step-by-step roadmap for building a new home or remodeling an existing one. The heavily-revised Fourth Edition...

Refrigeration and Air-Conditioning, Fourth Edition
Refrigeration and Air-Conditioning, Fourth Edition

Now in its fourth edition, this respected text delivers a comprehensive introduction to the principles and practice of refrigeration. Clear and straightforward, it is designed for students (NVQ/vocational level) and professional HVAC engineers, including those on short or CPD courses. Inexperienced readers are provided with a comprehensive...

Configuring Financial Accounting in SAP
Configuring Financial Accounting in SAP
What you have in your hands is a unique book. You may have seen several books on SAP Financial Accounting (FI) that are available in the market, but none of them are as comprehensive as this, covering the gamut of Financial Accounting in SAP Financials including—besides the regular topics —FI-CA (Contract Accounts...
The Little Republic: Masculinity and Domestic Authority in Eighteenth-Century Britain
The Little Republic: Masculinity and Domestic Authority in Eighteenth-Century Britain

The relationship between men and the domestic in eighteenth-century Britain has been obscured by two well-established historiographical narratives. The first charts changes in domestic patriarchy, founded on political patriarchalism in the early modern period and transformed during the eighteenth century by new types of family relationship...

Windows Communication Foundation Unleashed (WCF)
Windows Communication Foundation Unleashed (WCF)
Windows Communication Foundation (WCF) is a new Microsoft technology for allowing software to communicate. Superseding earlier technologies, such as COM/DCOM, .NET Remoting, ASP.NET Web Services, and the Web Services Enhancements for .NET, WCF provides a single solution that is designed to always be the best way to exchange data among software...
Spring Recipes: A Problem-Solution Approach, Second Edition
Spring Recipes: A Problem-Solution Approach, Second Edition

With over 3 Million users/developers, Spring Framework is the leading “out of the box” Java framework. Spring addresses and offers simple solutions for most aspects of your Java/Java EE application development, and guides you to use industry best practices to design and implement your applications.

The release of Spring...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy