Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Protection
Data Protection

This is the fundamental truth about data protection: backup is dead.

Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.

So what is data...

Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

Advanced Research on Computer Science and Information Engineering: International Conference, CSIE 2011, Zhengzhou, China, May 21-22, 2011. ... in Computer and Information Science)
Advanced Research on Computer Science and Information Engineering: International Conference, CSIE 2011, Zhengzhou, China, May 21-22, 2011. ... in Computer and Information Science)
The International Science & Education Researcher Association (ISER) puts its focus on the study and exchange of academic achievements of international researchers, and it also promotes educational reform in the world. In addition, it serves as academic discussion and communication platform, which is beneficial for education...
Principles of Financial Accounting
Principles of Financial Accounting

Needles/Powers/Crosson delivers interactive pedagogy by illustrating accounting principles and real-world examples to encourage critical thinking. This revision is based on an understanding of the nature, culture, and motivations of today's students and on extensive feedback from instructors. These substantial changes meet the needs of...

Avanti! (Italian)
Avanti! (Italian)

Informed by second-language acquisition research and supported by cutting-edge digital tools, the complete Avanti! program creates a dynamic learning environment that fosters communication and motivates students to succeed. With Connect and LearnSmart, Avanti's learning platform gives instructors...

Practical MongoDB: Architecting, Developing, and Administering MongoDB
Practical MongoDB: Architecting, Developing, and Administering MongoDB

The "one-size-fits-all" thinking regarding traditional RDBMSs has been challenged in the last few years by the emergence of diversified NoSQL databases. More than 120 NoSQL databases are now available in the market, and the market leader by far is MongoDB. With so many companies opting for MongoDB as their NoSQL database of choice,...

Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Troubleshooting PostgreSQL
Troubleshooting PostgreSQL

Intercept problems and challenges typically faced by PostgreSQL database administrators with the best troubleshooting techniques

About This Book

  • Detect and solve performance, indexing, and fuzzy matches problems and more in an effective way
  • Tune PostgreSQL databases and remove bottlenecks...
Learning WCF: A Hands-on Guide
Learning WCF: A Hands-on Guide

My entire career has been about learning and applying new technologies. It has also been about taking on new challenges related to technology and business. I enjoy learning new things,and I like to share things that I have learned through writing and public speaking. I like to help others learn challenging subjects,in particular...

Advanced Persistent Training: Take Your Security Awareness Program to the Next Level
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book...

Principles of Accounting (Financial Accounting)
Principles of Accounting (Financial Accounting)

Needles/Powers/Crosson delivers interactive pedagogy by illustrating accounting principles and real-world examples to encourage critical thinking. This revision is based on an understanding of the nature, culture, and motivations of today's students and on extensive feedback from instructors. These substantial changes meet the needs of...

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

Result Page: 100 99 98 97 96 95 94 93 92 91 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy