Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Population, Development, and the Environment: Challenges to Achieving the Sustainable Development Goals in the Asia Pacific
Population, Development, and the Environment: Challenges to Achieving the Sustainable Development Goals in the Asia Pacific
This book takes the reader into some of the most intransigent social, economic, and political issues that impact achieving sustainable development in Asia and the Pacific. Through meticulous analysis of the integrated relationships between population, development, and the environment, the chapters in this volume investigate the impacts of...
Handbook of Wireless Networks and Mobile Computing
Handbook of Wireless Networks and Mobile Computing

The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For...

Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Get SQL Server up and running on the Linux operating system and containers. No database professional managing or developing SQL Server on Linux will want to be without this deep and authoritative guide by one of the most respected experts on SQL Server in the industry. Get an inside look at how SQL Server for Linux works through the...
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)
VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)

Edward L. Haletky’s Complete, Solutions-Focused Guide to Running ESX Server 3.5, vSphere, and VMware 4.x

 

Extensively updated and revised, this is the definitive real-world guide to planning, deploying, and managing VMware ESX Server 3.5,...

VMware vSphere PowerCLI Reference: Automating vSphere Administration
VMware vSphere PowerCLI Reference: Automating vSphere Administration

The book is, of course, primarily targeted at administrators of vSphere environments who want to automate tasks. But the subjects that we discuss in the book cover so many aspects of the management of a VMware vSphere environment that everyone who comes into contact with a VMware vSphere environment will be able to pick up something...

The Black Death (Great Historic Disasters)
The Black Death (Great Historic Disasters)
In 1346, Europe was hit by the worst natural disaster in its recorded history: the Black Death. Generally believed to be a combination of bubonic plague and two other plague strains, the Black Death ravaged the length and breadth of Europe from Sicily to Norway, from Ireland to Russia, for five terrible years. Scholars can...
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes

Preparing for the Worst details the best practices in antiterrorism tactics and preparing for disaster. This book is for typical American families, business travelers, corporate executive management personnel, emergency first responders, school administrators, and local government officials responsible for public safety and emergency...

Mechanical Trading Systems: Pairing Trader Psychology with Technical Analysis
Mechanical Trading Systems: Pairing Trader Psychology with Technical Analysis
In 1987 my father and I purchased a seat on the New York Futures Exchange
for $100 and established a trading account with $25,000. The goal, he explained,
was to make $2,500 a week. Although this seemed like an extraordinary
annualized return on investment, I had heard of legendary traders
who had taken meager sums and
...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud
Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud

Written for IT and business professionals, this book provides the technical and business insight needed to plan, deploy and manage the services provided by the Microsoft Azure cloud. Find out how to integrate the infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) models with your existing business infrastructure while...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy