Home | Amazing | Today | Tags | Publishers | Years | Search 
Energy and Climate: How to achieve a successful energy transition
Energy and Climate: How to achieve a successful energy transition

Despite global concerns over dwindling resources, climate change and carbon dioxide emissions, fossil fuels still account for more than 80% of the world’s energy demands. As resources diminish and demand increases from rapidly developing nations such as China and India, the threat to both our environment and the security of our energy...

Drowning in Oil: BP & the Reckless Pursuit of Profit
Drowning in Oil: BP & the Reckless Pursuit of Profit

As night settled on April 20, 2010, a series of explosions rocked Deepwater Horizon, the immense semisubmersible drilling platform leased by British Petroleum, located 40 miles off the Louisiana coast. The ensuing inferno claimed 11 lives, and it would rage uncontained for two days, until its wreckage sank to a final resting place nearly a...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Future Generation Information Technology: Second International Conference, FGIT 2010
Future Generation Information Technology: Second International Conference, FGIT 2010

As information technology (IT) becomes specialized and fragmented, it is easy to lose sight that many topics have common threads and because of this, advances in one subdiscipline may transmit to another. The presentation of results between different subdisciplines encourages this interchange for the advancement of IT as a whole.

...

CISSP All-in-One Exam Guide, 6th Edition
CISSP All-in-One Exam Guide, 6th Edition

A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris

Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by...

Oracle Data Guard 11gR2 Administration Beginner's Guide
Oracle Data Guard 11gR2 Administration Beginner's Guide

If you're an Oracle Database Administrator it's almost essential to know how to protect and preserve your data. This is the perfect primer to Data Guard that covers all the bases with a totally practical, user-friendly approach.

Overview

  • Understand the essentials and components of Oracle Data...
Crisis Management and Emergency Planning: Preparing for Today's Challenges
Crisis Management and Emergency Planning: Preparing for Today's Challenges

Emergency managers and officials have seen a tremendous increase in the planning responsibilities placed on their shoulders over the last decade. Crisis Management and Emergency Planning: Preparing for Today's Challenges supplies time-tested insights to help communities and organizations become better prepared to cope...

Linux Mint Essentials
Linux Mint Essentials

A practical guide to Linux Mint for the novice to the professional

About This Book

  • Learn to use Linux Mint like a pro, starting with the installation and going all the way through maintaining your system
  • Covers everything you need to know in order to be productive, including browsing the...
Restoration and Development of the Degraded Loess Plateau, China (Ecological Research Monographs)
Restoration and Development of the Degraded Loess Plateau, China (Ecological Research Monographs)

This book presents state-of-the-art scientific evidence and technological innovations to restore lands on the Loess Plateau of China, known worldwide for its serious land degradation and desertification problems. Supported by a rapidly developing Chinese economy and the dissemination of effective technology, the Grain-for-Green Project and...

Exam Ref 70-412 Configuring Advanced Windows Server 2012 R2 Services (MCSA)
Exam Ref 70-412 Configuring Advanced Windows Server 2012 R2 Services (MCSA)

Fully updated for Windows Server 2012 R2! Prepare for Microsoft Exam 70-412—and help demonstrate your real-world mastery of advanced configuration tasks for Windows Server infrastructure. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy