Home | Amazing | Today | Tags | Publishers | Years | Search 
The Lessons of Tragedy: Statecraft and World Order
The Lessons of Tragedy: Statecraft and World Order
An eloquent call to draw on the lessons of the past to address current threats to international order

The ancient Greeks hard?wired a tragic sensibility into their culture. By looking disaster squarely in the face, by understanding just how badly things could spiral out of control, they sought to create a
...
The Shockwave Rider
The Shockwave Rider

He was the most dangerous fugitive alive, but he didn’t exist!

Nickie Haflinger had lived a score of lifetimes . . . but technically he didn’t exist. He was a fugitive from Tarnover, the high-powered government think tank that had educated him. First he had broken his identity code—then he
...

Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud
Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud

Written for IT and business professionals, this book provides the technical and business insight needed to plan, deploy and manage the services provided by the Microsoft Azure cloud. Find out how to integrate the infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) models with your existing business infrastructure while...

Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
Sustainable Technology Development
Sustainable Technology Development

In the time it takes to read this sentence, about fifteen people will be added to the world's population.  Read the sentence again, and there will be thirty. Tomorrow, each of these people will be demanding greater prosperity. Production and consumption are increasing fast but will have to grow even faster in the future to keep up...

CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)

The best fully integrated study system available for the CompTIA Security+ exam!

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

With hundreds of...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Software Testing
Software Testing

Software Testing is the book for new or aspiring software testers interested in learning about this crucial part of the software development process. The complexity and size of today's software makes writing bug-free code extremely difficult, even for highly experienced programmers. Couple that with our increasing reliance on software for...

Human Geoscience (Advances in Geological Science)
Human Geoscience (Advances in Geological Science)
This book is a product of the joint efforts of interdisciplinary academic fields under the integrative framework of human geoscience. Human geoscience is a new genre of geoscience concerned with the natural phenomena that occur on the surface of the Earth and their relations with human activities. It therefore has connections with many...
Pro Microsoft Hyper-V 2019: Practical Guidance and Hands-On Labs
Pro Microsoft Hyper-V 2019: Practical Guidance and Hands-On Labs
Successfully create and manage your Hyper-V environment without any of the marketing fluff. This book's lab-driven, hands-on approach will get you up and running as quickly and efficiently as possible.

Virtualization is the cornerstone of today’s data center.  As a modern-day IT pro, you are required...
Complete Book of Remote Access: Connectivity and Security (Best Practices)
Complete Book of Remote Access: Connectivity and Security (Best Practices)

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy