Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering ArcGIS Enterprise Administration: Install, configure, and manage ArcGIS Enterprise to publish, optimize, and secure GIS services
Mastering ArcGIS Enterprise Administration: Install, configure, and manage ArcGIS Enterprise to publish, optimize, and secure GIS services

Key Features

  • Install and configure the components of ArcGIS Enterprise to meet your organization's requirements
  • Administer all aspects of ArcGIS Enterprise through user interfaces and APIs
  • Optimize and Secure ArcGIS Enterprise to make it run efficiently and...
Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Apache Solr Beginner's Guide
Apache Solr Beginner's Guide

Where do you start with Apache Soir? We'd suggest with this book, which assumes no prior knowledge and takes you step by careful step through all the essentials, putting you on the road towards successful implementation.

Overview

  • Learn to use Solr in real-world contexts, even if you are not a...
Agile Data Science: Building Data Analytics Applications with Hadoop
Agile Data Science: Building Data Analytics Applications with Hadoop

Mining big data requires a deep investment in people and time. How can you be sure you’re building the right models? With this hands-on book, you’ll learn a flexible toolset and methodology for building effective analytics applications with Hadoop.

Using lightweight tools such as Python, Apache Pig, and the...

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would
...

Surgical Approaches to the Facial Skeleton
Surgical Approaches to the Facial Skeleton

Featuring over 400 full-color surgical photographs and drawings, this text/atlas is a step-by-step guide to the surgical approaches used to expose the facial skeleton. The authors describe in detail the key anatomic structures and the technical aspects of each approach, so that the surgeon can safely gain access to the region of the...

Forex Essentials in 15 Trades: The Global-View.com Guide to Successful Currency Trading (Wiley Trading)
Forex Essentials in 15 Trades: The Global-View.com Guide to Successful Currency Trading (Wiley Trading)

Traders are constantly learning their craft. Those who do not share information, discuss tactics and review prior trades are doomed for failure. Global-View.com knows this. It is the leading destination for Forex traders looking to learn and discuss trading. With over 33,000 registered users from 125 countries, Global-View.com exposes its...

The Enterprise and Scrum
The Enterprise and Scrum

This book is for those who want to use Scrum throughout their enterprise for product development. Right now, you might have pockets within your enterprise that use Scrum, and they are more effective than elsewhere. You are at least partially convinced that using Scrum throughout the enterprise might be a way to make the whole enterprise more...

Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
Learn the 14 ways in which you can help make the Internet a safer place for you and your family. You teach your children to look both ways before crossing the street. You tell them not to talk to strangers. But do you really know how to teach them to safely use the Internet? In this book, Linda Criddle, a leading child safety expert, offers a...
Pro JMX: Java Management Extensions (Expert's Voice)
Pro JMX: Java Management Extensions (Expert's Voice)

Get ready to plunge into the complete world of JMX architecture―including the release of JMX Remoting 1.2! Pro JMX: Java Management Extensions features cutting-edge examples of JMX integration with distributed applications, including sequence diagrams and real-world sample code.

Author Jeff Hanson takes...

Algebra II For Dummies (Math & Science)
Algebra II For Dummies (Math & Science)
Besides being an important area of math for everyday use, algebra is a passport to studying subjects like calculus, trigonometry, number theory, and geometry, just to name a few. To understand algebra is to possess the power to grow your skills and knowledge so you can ace your courses and possibly pursue further study in math.

Algebra...

OPC Unified Architecture
OPC Unified Architecture
The OPC Foundation provides specifications for data exchange in industrial automation. There is a long history of COM/DCOM-based specifications, most prominent OPC Data Access (DA), OPC Alarms and Events (A&E), and OPC Historical Data Access (HDA), which are widely accepted in the industry and implemented by almost every...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy