Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing Indoor Air Quality, Fourth Edition
Managing Indoor Air Quality, Fourth Edition
As predicted in the earlier editions, concerns over Indoor Air Quality (IAQ) have driven it to the forefront of current workplace problems. More than ever, health, economic and legal matters associated with IAQ seem destined to make it a dominant problem for developers, owners and managers of commercial and institutional properties well into this...
Encyclopedia of Civil War Shipwrecks
Encyclopedia of Civil War Shipwrecks
On the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,...
How to Do Everything with Microsoft Office Live
How to Do Everything with Microsoft Office Live
Get your e-business started with ease and quickly boost sales and productivity with help from this hands-on guide. How to Do Everything with Microsoft Office Live explains how to harness this all-in-one service to create and maintain a dynamic online presence for your business. Learn how to set up a commerce-driven website and take...
Web Application Design Patterns (Interactive Technologies)
Web Application Design Patterns (Interactive Technologies)
Increasingly, software applications are built using web technologies and made accessible via web browsers (e.g., Internet Explorer, Firefox, Safari, and Opera). They are commonly referred to as web applications, or hosted applications—applications based on a software as a service (SaaS) model1 or cloud computing

...
Memory Systems: Cache, DRAM, Disk
Memory Systems: Cache, DRAM, Disk
The first book to comprehensively cover the intricacies of optimizing the behavior of modern memory systems using a holistic design approach.

Is your memory hierarchy stopping your microprocessor from performing at the high level it should be? Memory Systems: Cache, DRAM, Disk shows you how to resolve this problem. ...
Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) (Authorized Self-Study Guide)
Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) (Authorized Self-Study Guide)
Professional certifications have been an important part of the computing industry for many years and will continue to become more important. Many reasons exist for these certifications, but the most popularly cited reason is that of credibility. All other considerations held equal, a certified employee/consultant/job candidate is considered more...
Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Do you really understand your online presence? Are you confident that visitors can use your website? Do you know their motivations? How do online communities perceive your company? To innovate and adapt your business quickly, you must know the answers to these questions. Complete Web Monitoring demonstrates how to measure every aspect of your web...
Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
Mastering System Center Configuration Manager 2007 R2
Mastering System Center Configuration Manager 2007 R2
Mastering System Center Configuration Manager 2007 provides intermediate and advanced coverage of all aspects of the product, including planning and installation, upgrading Systems Management Server 2003, deploying software and operating systems, security, monitoring and troubleshooting, and automating and customizing SCCM 2007 with scripts.
...
The Next Leap in Productivity: What Top Managers Really Need to Know about Information Technology
The Next Leap in Productivity: What Top Managers Really Need to Know about Information Technology
What Top Managers Really Need to Know about Information Technology

"These kinds of productivity principles are not mere theory. When we put these same principles into effect, our productivity went up more than we had thought possible. And our employee morale went up, too. It became easier to write code the right way and harder to make...

Becoming Agile: ...in an imperfect world
Becoming Agile: ...in an imperfect world
Many books discuss Agile from a theoretical or academic perspective. Becoming Agile takes a different approach and focuses on explaining Agile from a case-study perspective. Agile principles are discussed, explained, and then demonstrated in the context of a case study that flows throughout the book. The case study is based on a mixture of...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy