Home | Amazing | Today | Tags | Publishers | Years | Search 
Scalable Internet Architectures (Developer's Library)
Scalable Internet Architectures (Developer's Library)
As a developer, you are aware of the increasing concern amongst developers and site architects that websites be able to handle the vast number of visitors that flood the Internet on a daily basis. Scalable Internet Architecture addresses these concerns by teaching you both good and bad design methodologies for...
The AMA Handbook of Project Management
The AMA Handbook of Project Management
This handbook provides a set of principles and processes for
those managers and professionals who want to enhance their
understanding of the theory and practice of project management.
Like all good handbooks, this is a comprehensive reference
source for practical how-to-do-it information. This handbook
also can be used in
...
Enterprise Security: The Manager's Defense Guide
Enterprise Security: The Manager's Defense Guide

E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...

Flood Pulsing in Wetlands: Restoring the Natural Hydrological Balance
Flood Pulsing in Wetlands: Restoring the Natural Hydrological Balance

The latest cutting-edge research on flood pulsing and wetland restoration in North America

Presenting the latest research from leaders in the field of restoration ecology, Flood Pulsing in Wetlands reflects the current movement to incorporate flood pulsing into wetland restoration efforts. Emphasizing how integral flood pulsing is...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

How: Why How We Do Anything Means Everything...in Business (and in Life)
How: Why How We Do Anything Means Everything...in Business (and in Life)
The flood of information and unprecedented transparency reshaping today's business world has dramatically changed the rules of the game. It's no longer what you do that sets you apart from others, but how you do what you do. Whats are commodities, easily duplicated or reverse-engineered. Sustainable advantage and enduring success—for both...
MySQL Cookbook
MySQL Cookbook

Along with MySQL's popularity has come a flood of questions about solving specific problems, and that's where this Cookbook is essential. Designed as a handy resource when you need quick solutions or techniques, the book offers dozens of short, focused pieces of code and hundreds of worked-out examples for programmers...

Energy Evolution (The Eco-Technology Series)
Energy Evolution (The Eco-Technology Series)
Coincidence? Or perhaps not! Standing as we are on the threshold of a new era, the first dawning of a new age, there is an air of expectancy of things imminent and better. In a certain sense this has psychologically programmed us with a willingness to embrace new concepts, to inaugurate and accept far-reaching change. It is also a time to reflect...
The Fertile Earth: Nature's Energies in Agriculture, Soil Fertilisation and Forestry (The Eco-Technology Series, Volume 3)
The Fertile Earth: Nature's Energies in Agriculture, Soil Fertilisation and Forestry (The Eco-Technology Series, Volume 3)
What is the essence of a tree? How does a blade of grass grow? What do we really understand of the internal events and forces responsible for their upward thrust towards the heavens, and on what conditions do these energies depend? Where do they come from and how do they interact? What inhibits their proper interaction, and what enhances it? As the...
Problems and Solutions in Biological Sequence Analysis
Problems and Solutions in Biological Sequence Analysis
Bioinformatics, an integral part of post-genomic biology, creates principles and ideas for computational analysis of biological sequences. These ideas facilitate the conversion of the flood of sequence data unleashed by the recent information explosion in biology into a continuous stream of discoveries. Not surprisingly, the new biology of the...
IT Service Management Guide: Vol. 1
IT Service Management Guide: Vol. 1
The importance of IT Service Management is becoming widely recognized. Whereas in the 1960s and 1970s interest was still focused mainly on the improvement of hardware, and whereas the development of software was the major concern until well into the 1980s, the 1990s was the decade that saw the rise of service management.

For decades,
...
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy