Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Solaris 9 Security (Networking)
Solaris 9 Security (Networking)
Solaris is one of the most widely used operating systems. One of the main reasons for its popularity is its enhanced security. Solaris 9 protects systems from internal and external security threats by restricting access to system data, authenticating and encrypting interactive sessions with the Solaris operating environment, and supporting protocol...
Django JavaScript Integration: AJAX and jQuery
Django JavaScript Integration: AJAX and jQuery

In this book, we will be exploring Django JavaScript integration and build an Ajax application using jQuery. We will build a Web 2.0 intranet employee directory, and we will aim for a solution that is Pythonic in more ways than one.

Web development that is more "Pythonic" than just Python

This book is intended...

MOS 2010 Study Guide for Microsoft® Word Expert
MOS 2010 Study Guide for Microsoft® Word Expert

Desktop computing proficiency is increasingly important in today’s business world. As a result, when screening, hiring, and training employees, employers can feel reassured by relying on the objectivity and consistency of technology certification to ensure the competence of their workforce. As an employee or job seeker, you can use...

The 7 Hidden Reasons Employees Leave: How to Recognize the Subtle Signs and Act Before It's Too Late
The 7 Hidden Reasons Employees Leave: How to Recognize the Subtle Signs and Act Before It's Too Late
This book is about the hidden, elusive motivations that cause capable employees to start questioning their decision to join your company, start thinking of leaving, eventually disengage, and finally, leave.

The true root causes of voluntary employee turnover are hiding in plain sight. If we really think about it, we already know what
...
Firing at Will: A Manager's Guide
Firing at Will: A Manager's Guide

Firing at Will shows managers and employers how to do the most difficult part of their jobs: firing employees. Written by a leading employment lawyer in a refreshingly unlawyerly style, this guide takes the reader through the always-risky process of letting an employee go. Many employers and managers are afraid to pull the...

The SAIC Solution: How We Built an $8 Billion Employee-Owned Technology Company
The SAIC Solution: How We Built an $8 Billion Employee-Owned Technology Company
For more than three decades, Science Applications International Corporation (SAIC)—the largest employee-owned research and technology company in the United States—has achieved unparalleled success in the areas of science, engineering, and technology, all while flying well below the radar of most casual business observers.

As the...

No Beast So Fierce: The Terrifying True Story of the Champawat Tiger, the Deadliest Animal in History
No Beast So Fierce: The Terrifying True Story of the Champawat Tiger, the Deadliest Animal in History

The astonishing true story of the man-eating tiger that claimed a record 437 human lives

“Thrilling. Fascinating. Exciting.” Wall Street Journal • "Riveting. Haunting.” —Scientific American

Nepal, c....

Role-Based Access Control
Role-Based Access Control

Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,...

PHR / SPHR: Professional in Human Resources Certification Study Guide
PHR / SPHR: Professional in Human Resources Certification Study Guide

Updated edition of best-selling guide for PHR and SPHR candidates

The demand for qualified human resources professionals is on the rise. The new Professional in Human Resources (PHR) and Senior Professional in Human Resources (SPHR) exams from the Human Resources Certification Institute (HRCI) reflect the evolving industry...

Competing with High Quality Data: Concepts, Tools, and Techniques for Building a Successful Approach to Data Quality
Competing with High Quality Data: Concepts, Tools, and Techniques for Building a Successful Approach to Data Quality

Create a competitive advantage with data quality

Data is rapidly becoming the powerhouse of industry, butlow-quality data can actually put a company at a disadvantage. Tobe used effectively, data must accurately reflect the real-worldscenario it represents, and it must be in a form that is usable andaccessible. Quality data...

IBM Websphere Portal V5: A Guide for Portlet Application Development (IBM Redbooks)
IBM Websphere Portal V5: A Guide for Portlet Application Development (IBM Redbooks)

This IBM Redbook helps you design, develop and implement portlet applications using the IBM WebSphere Studio Site Developer and the Portal Toolkit V5. The information provided in this redbook targets Business-to-Employee (B2E) enterprise applications, but most of the scenarios presented apply to Business-to-Consumer (B2C)...

Apple Pro Training Series : Advanced Logic Pro 7
Apple Pro Training Series : Advanced Logic Pro 7
If you want to do more than simply use Logic to improve the audio in your video projectsif you want to start actually creating and producing music with it-this Apple-certified guide provides the key. Whether you're a composer, producer, songwriter, engineer, studio programmer or simply want to create and produce pro-quality music in your...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy