Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)
Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)

This is a book about patterns for resource management in software systems. The patterns provide solutions for problems that are typically encountered by software architects and developers when trying to provide an effective and efficient means of managing resources in a software system. Efficient management of resources is critical in the...

SAP HANA Starter
SAP HANA Starter

SAP HANA is SAP's in-memory database technology, and the focal point of their next generation strategy. Using column-based storage to provide highly compressed and rapidly accessed data, a SAP HANA application can be several hundred times faster than the same application on previous generation database technology.

SAP HANA...

Microservices From Day One: Build robust and scalable software from the start
Microservices From Day One: Build robust and scalable software from the start

Learn what a microservices architecture is, its advantages, and why you should consider using one when starting a new application. The book describes how taking a microservices approach from the start helps avoid the complexity and expense of moving to a service-oriented approach after applications reach a critical code base size or...

Modern Fortran: Style and Usage
Modern Fortran: Style and Usage

Fortran is one of the oldest high-level languages and remains the premier language for writing code for science and engineering applications. Modern Fortran: Style and Usage is a book for anyone who uses Fortran, from the novice learner to the advanced expert. It describes best practices for programmers, scientists, engineers, computer...

The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models
The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models

The ability to create and understand financial models that assess the valuation of a company, the projects it undertakes, and its future earnings/profit projections is one of the most valued skills in corporate finance. However, while many business professionals are familiar with financial statements and accounting reports, few are truly...

Inventors at Work: The Minds and Motivation Behind Modern Inventions
Inventors at Work: The Minds and Motivation Behind Modern Inventions

Inventors at Work: The Minds and Motivation Behind Modern Inventions is a collection of interviews with inventors of famous products, innovations, and technologies that have made life easier or even changed the way we live. All of these scientists, engineers, wild-eyed geniuses, and amateur technologists have dedicated their...

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

New Developments in the Visualization and Processing of Tensor Fields (Mathematics and Visualization)
New Developments in the Visualization and Processing of Tensor Fields (Mathematics and Visualization)

Bringing together key researchers in disciplines ranging from visualization and image processing to applications in structural mechanics, fluid dynamics, elastography, and numerical mathematics, the workshop that generated this edited volume was the third in the successful Dagstuhl series. Its aim, reflected in the quality and relevance of...

Linking Teacher Evaluation and Student Learning
Linking Teacher Evaluation and Student Learning

In Linking Teacher Evaluation and Student Learning, researchers Pamela D. Tucker and James H. Stronge show that including measures of student achievement in teacher evaluations can help schools focus their efforts to meet higher standards. You'll see how four school systems have built such measures into their...

The Coming Generational Storm: What You Need to Know about America's Economic Future
The Coming Generational Storm: What You Need to Know about America's Economic Future
In 2030, as 77 million baby boomers hobble into old age, walkers will outnumber strollers; there will be twice as many retirees as there are today but only 18 percent more workers. How will America handle this demographic overload? How will Social Security and Medicare function with fewer working taxpayers to support these programs? According to...
PIC in Practice, Second Edition: A Project -based Approach
PIC in Practice, Second Edition: A Project -based Approach
'It will make practical PIC applications available to a wider, less specialised audience.. Very thoughtful, careful use of language... Excellent selection of examples in terms of range and complexity... Given the rapidly expanding application of PICs, partiularly in education, there will be a need for books like this.' Paul Wareing, University of...
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy