Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Open Source GIS: A GRASS GIS Approach
Open Source GIS: A GRASS GIS Approach
Over the past decade, Geographical Information Systems (GIS) have evolved from a highly specialized niche to a technology that affects nearly every aspect of our lives, from finding driving directions to managing natural disasters. While just a few years ago the use of GIS was restricted to a group of researchers, planners and...
Net Locality: Why Location Matters in a Networked World
Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk with crowds of anonymous people. He sees skyscrapers and signage extending to the horizon. There is a lot going on – people talking, walking, playing, fighting, screaming, driving, and smiling. He sees a coffee shop that excites his interest. He pulls...
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Learning Java, Second Edition
Learning Java, Second Edition
This new edition of Learning Java has been expanded and updated for Java 2 Standard Edition SDK 1.4. It comprehensively addresses important topics such as web applications, servlets, and XML that are increasingly driving enterprise applications. This edition provides full coverage of all Java 1.4...
Cisco Network Security Little Black Book
Cisco Network Security Little Black Book
With this concise, problem-solving guide, networking professionals will learn how to identify network security threat implement uniform security throughout their networks, secure remote dial-in access with CiscoSecure ACS and Cisco IOS AAA features, protect Internet access on their perimeter routers with the CiscoSecure IOS firewall software, and...
Computer Viruses and Other Malicious Software:  A Threat to the Internet Economy
Computer Viruses and Other Malicious Software: A Threat to the Internet Economy
Malware attacks are increasing both in frequency and sophistication, thus posing a serious threat to the Internet economy and to national security. This book is a first step toward addressing the threat of malware in a comprehensive, global manner. It informs readers about malware -- its growth, evolution and countermeasures to combat it; presents...
Buoyancy Effects on Natural Ventilation
Buoyancy Effects on Natural Ventilation

This book describes in depth the fundamental effects of buoyancy, a key force in driving air and transporting heat and pollutants around the interior of a building. This book is essential reading for anyone involved in the design and operation of modern sustainable, energy-efficient buildings, whether a student, researcher, or practitioner....

Handbook of Electrical Design Details (Handbook)
Handbook of Electrical Design Details (Handbook)
A COMPREHENSIVE SOURCE OF TECHNICAL DETAILS ON ELECTRICAL POWER FROM GENERATION TO PRACTICAL APPLICATIONS

Reliable, low-cost electric power is a fundamental requirement for modern society, making possible such vital services as lighting, HVAC, transportation, communication, and data processing, in addition to driving motors of...

Designing with Web Standards (2nd Edition)
Designing with Web Standards (2nd Edition)
Best-selling author, designer, and web standards evangelist Jeffrey Zeldman has updated his classic, industry-shaking guidebook. This new edition--now in full color--covers improvements in best practices and advances in the world of browsers since the first edition introduced the world to standards-based design. Written in the same engaging and...
Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale
Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale

Highly available microservice-based web apps for Cloud with Java

Key Features

  • Take advantage of the simplicity of Spring to build a full-fledged application
  • Let your applications run faster while generating smaller cloud service bills
  • Integrate your...
Macromedia ColdFusion 5 Training from the Source
Macromedia ColdFusion 5 Training from the Source

Macromedia ColdFusion is a powerful Web application server that lets companies build and deploy industrial-strength Web applications, such as those behind dynamic content sites and online stores. Non-programmers find the application easy enough to use for site-maintenance tasks, while developers find it powerful enough to use for...

Implementing Lean Software Development: From Concept to Cash (The Addison-Wesley Signature Series)
Implementing Lean Software Development: From Concept to Cash (The Addison-Wesley Signature Series)
In 2003, Mary and Tom Poppendieck's Lean Software Development introduced breakthrough development techniques that leverage Lean principles to deliver unprecedented agility and value. Now their widely anticipated sequel and companion guide shows exactly how to implement Lean software development, hands-on.

This new book draws on the...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy