 |
|
 Managing Indoor Air Quality, Fourth EditionAs predicted in the earlier editions, concerns over Indoor Air Quality (IAQ) have driven it to the forefront of current workplace problems. More than ever, health, economic and legal matters associated with IAQ seem destined to make it a dominant problem for developers, owners and managers of commercial and institutional properties well into this... |  |  Encyclopedia of Civil War ShipwrecksOn the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,... |  |  How to Do Everything with Microsoft Office LiveGet your e-business started with ease and quickly boost sales and productivity with help from this hands-on guide. How to Do Everything with Microsoft Office Live explains how to harness this all-in-one service to create and maintain a dynamic online presence for your business. Learn how to set up a commerce-driven website and take... |
|
 Web Application Design Patterns (Interactive Technologies)Increasingly, software applications are built using web technologies and made accessible via web browsers (e.g., Internet Explorer, Firefox, Safari, and Opera). They are commonly referred to as web applications, or hosted applications—applications based on a software as a service (SaaS) model1 or cloud computing
... |  |  Memory Systems: Cache, DRAM, DiskThe first book to comprehensively cover the intricacies of optimizing the behavior of modern memory systems using a holistic design approach.
Is your memory hierarchy stopping your microprocessor from performing at the high level it should be? Memory Systems: Cache, DRAM, Disk shows you how to resolve this problem. ... |  |  |
|
 Beautiful Security: Leading Security Experts Explain How They ThinkIn this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found... |  |  |  |  Computer Fraud Casebook: The Bytes that BiteIn 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer... |
|
 Mastering System Center Configuration Manager 2007 R2Mastering System Center Configuration Manager 2007 provides intermediate and advanced coverage of all aspects of the product, including planning and installation, upgrading Systems Management Server 2003, deploying software and operating systems, security, monitoring and troubleshooting, and automating and customizing SCCM 2007 with scripts. ... |  |  |  |  Becoming Agile: ...in an imperfect worldMany books discuss Agile from a theoretical or academic perspective. Becoming Agile takes a different approach and focuses on explaining Agile from a case-study perspective. Agile principles are discussed, explained, and then demonstrated in the context of a case study that flows throughout the book. The case study is based on a mixture of... |
|
| Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |