Home | Amazing | Today | Tags | Publishers | Years | Search 
MCSA/MCSE: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide (70-291)
MCSA/MCSE: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide (70-291)
Microsoft’s Microsoft Certified Systems Administrator (MCSA) and Microsoft Certified Systems Engineer (MCSE) tracks for Windows Server 2003 are the premier certifications for computer industry professionals. Covering the core technologies around which Microsoft’s future will be built, this program provides powerful...
CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)
CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)

CD FEATURES More Than 200 PRACTICE QUESTIONS

 

CompTIA® Security+ Exam Cram, Third Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for...

Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Within the last 15 years in the field of “sputtering by particle bombardment” several new and important results have been published in internal reports, in PhD thesis, as well as in the open literature. This relates especially to a more detailed understanding of the sputtering process by computational means such as...
Renewable and Efficient Electric Power Systems
Renewable and Efficient Electric Power Systems
Engineering for sustainability is an emerging theme for the twenty-first century, and the need for more environmentally benign electric power systems is a critical part of this new thrust. Renewable energy systems that take advantage of energy sources that won’t diminish over time and are independent of fluctuations in...
Introducing Microsoft SQL Server 2012
Introducing Microsoft SQL Server 2012
Microsoft SQL Server 2012 is Microsoft’s first cloud-ready information platform. It gives organizations effective tools to protect, unlock, and scale the power of their data, and it works across a variety of devices and data sources, from desktops, phones, and tablets, to datacenters and both private and public clouds. Our purpose in...
Introduction to Hardware Security and Trust
Introduction to Hardware Security and Trust
As technology feature size of devices and interconnects shrink at the rate predicted by Moore’s law, gate density and design complexity on single integrated chip (IC) keep increasing in recent decades. The close to nanoscale fabrication process introduces more manufacturing errors. New failure mechanisms that are not covered...
Content is Currency: Developing Powerful Content for Web and Mobile
Content is Currency: Developing Powerful Content for Web and Mobile

Content. It’s become a very powerful word in the Internet age, empowering people everywhere to have a voice. Through words, video, audio, and all its other forms, content tells the story of your product or service and propels your brand into the hearts and minds of your prospects, customers, and others. Without content, the web would...

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Engineering and Scientific Computations Using MATLAB
Engineering and Scientific Computations Using MATLAB
I would like to welcome the reader lo this Matlab® book, which is the companion to the high-performance Matlab environment and outstanding Math Works users manuals. I sincerely feel that 1 have written a very practical problem-solving type of book that provides a synergetic, informa- tive, and entertaining learning experience....
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...

Algorithms Sequential and Parallel: A Unified Approach
Algorithms Sequential and Parallel: A Unified Approach

A major thrust of computer science is the design, analysis, implementation, and scicntific evaluation of algorithms to solve critical problems. In addition, new challenges are being offered to computer scientists in the field of computational science and engineering, which includes challenging problems in computational biology,...

Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition
Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition

This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and...

Result Page: 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy