Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Getting Started with InstallShield Developer and Windows Installer Setups
Getting Started with InstallShield Developer and Windows Installer Setups
InstallShield Developer is the most powerful and flexible solution for creating today’s Windows Installer setups. And this book is your authoritative guide to this most critical step in the software release process: the installation.

InstallShield authority Bob Baker guides you through Developer’s integrated development environment...

Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Learn the differences between various log aggregation and correlation systems
  • Examine regulatory and industry requirements
  • Evaluate various deployment scenarios
  • Properly size your deployment
  • Protect the Cisco Security MARS appliance from attack
  • Generate reports,...
Technological Turf Wars: A Case Study of the Antivirus Industry
Technological Turf Wars: A Case Study of the Antivirus Industry

In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that...

Waste to Energy: Opportunities and Challenges for Developing and Transition Economies
Waste to Energy: Opportunities and Challenges for Developing and Transition Economies

Solid waste management is currently a major issue worldwide with numerous areas reaching critical levels. Many developing countries and countries in transition still miss basic waste management  infrastructure and awareness. It is here that many of the solid waste management problems and challenges are currently being faced. As such,...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications
Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications

Get up and running with the fundamentals of Bitcoin and blockchain

Key Features

  • Learn quick, effective, and easy ways to master blockchain and Bitcoin
  • Understand the impact of decentralization and discover ways to tackle it
  • Explore the future of Bitcoin...
E-Commerce and V-Business
E-Commerce and V-Business
E-commerce and V-business examines the impact of the Internet and associated technologies on two related aspects of business: electronic commerce and virtual organization. Using a combination of recent theory and empirical evidence it demonstrates how forward thinking organizations are reaping considerable advantages from exciting new business...
CCENT Cisco Certified Entry Networking Technician Study Guide (Exam 640-822) (Study Guide Book & CD)
CCENT Cisco Certified Entry Networking Technician Study Guide (Exam 640-822) (Study Guide Book & CD)
Expert exam prep from leading Cisco authority Todd Lammle

Start your preparation here for Cisco's new CCENT entry-level networking certification, your entry point into Cisco's popular CCNA certification track. This comprehensive study guide from leading Cisco authority Todd Lammle thoroughly prepares you for the...

Business Process Mapping: Improving Customer Satisfaction
Business Process Mapping: Improving Customer Satisfaction
Praise For Business Process Mapping: Improving Customer Satisfaction, Second Edition

"A must-read for anyone performing business process mapping! This treasure shares step-by-stepapproaches and critical success factors, based on years of practical, customer-focused experience.A real winner!"
в
...

Physical Database Design Using Oracle (Foundations of Database Design)
Physical Database Design Using Oracle (Foundations of Database Design)

The evolution of Oracle has led to a revolution in design practices. For Oracle 10g, database physical structures have become more complex than ever before and database designers face multiple ways to implement their logical models. IS students studying database design and administration need to be able to implement management systems in a...

Dependability of Networked Computer-based Systems (Springer Series in Reliability Engineering)
Dependability of Networked Computer-based Systems (Springer Series in Reliability Engineering)

This book is meant for research scholars, scientists and practitioners involved with the application of computer-based systems in critical applications. Ensuring dependability of systems used in critical applications is important due to the impact of their failures on human life, investment and environment. The individual aspects of...

Jenkins Continuous Integration Cookbook
Jenkins Continuous Integration Cookbook
Jenkins is a Java-based Continuous Integration (CI) server that supports the discovery of defects early in the software cycle. Thanks to over 400 plugins, Jenkins communicates with many types of systems, building and triggering a wide variety of tests.

CI involves making small changes to software, and then building and
...
unlimited object storage image
Result Page: 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy