Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protect Your Wealth from the Ravages of Inflation: A Three-Step Method
Protect Your Wealth from the Ravages of Inflation: A Three-Step Method

Protect Your Wealth from the Ravages of Inflation is for people who have financial assets to protect in an unpredictable, inflationary environment. Maybe you have tried traditional financial advice, financial planning, and passive investment management techniques and you’re still losing ground. Maybe you’re worried that...

Cloud Capacity Management (Expert's Voice in Information Technology)
Cloud Capacity Management (Expert's Voice in Information Technology)

Cloud Capacity Management helps readers in understanding what the cloud, IaaS, PaaS, SaaS are, how they relate to capacity planning and management  and which stakeholders are involved in delivering value in the cloud value chain. It explains the role of capacity management for a creator, aggregator, and consumer of cloud...

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

The only official study guide for the new CCSP exam

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter...

Mobile Usability:  How Nokia Changed the Face of the Mobile Phone
Mobile Usability: How Nokia Changed the Face of the Mobile Phone

When it comes to delivering product design innovations to mobile device users, Nokia is the company against which all others are judged. Now, the philosophies and working methods by which Nokia revolutionized product usability are explained for the first time in Mobile Usability: Change the Face of the Mobile Phone.

Written with...

Sas 9.1 Companion For Windows: Books
Sas 9.1 Companion For Windows: Books
Every SAS Windows user will benefit from this companion! This companion describes aspects of the SAS interface and the SAS language that are specific to the Microsoft Windows NT, Windows 2000, and Windows XP environments. You will learn how to configure and customize your SAS session to accommodate the way you like to work, manage SAS libraries and...
Integration of ICT in Smart Organizations
Integration of ICT in Smart Organizations
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management

An important aspect of managing human capital in the 21st century workplace is managing the interface between humans and information technology, particularly the World Wide Web. The Web has changed not only how and where business is conducted, but also how and where work is done. Personal web usage has created many desirable organizational...

The Best Damn IT Security Management Book Period
The Best Damn IT Security Management Book Period
This chapter will address vulnerabilities and why they are important. It also discusses a concept known as Windows of Vulnerability, and shows how to determine the risk a given vulnerability poses to your environment.

What Are Vulnerabilities?

So, what are
...
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
The relatively recent increase in computational power available for mathematical modeling and simulation raises the possibility that modern numerical methods can play a significant role in the analysis of complex particulate flows. This introductory monograph focuses on basic models and physically based computational solution strategies for the...
New Trends in Software Process Modelling (Software Engineering and Knowledge Engineering)
New Trends in Software Process Modelling (Software Engineering and Knowledge Engineering)
Over the years, a variety of software process models have been designed to structure, describe and prescribe the software systems construction process. More recently, software process modelling is increasingly dealing with new challenges raised by the tests that the software industry has to face. This book addresses these new trends in software...
unlimited object storage image
Result Page: 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 321 320 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy