Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco CCIE Fundamentals: Network Design & Case Studies
Cisco CCIE Fundamentals: Network Design & Case Studies
For a sophisticated view of networking design concepts that goes from lofty to granular in the blink of an eye, Network Design and Case Studies is a sure winner. This mammoth entry in Cisco's growing collection of reference books provides equal parts academic theory and practical application.

The first half of the book deals...

Speaking about Science: A Manual for Creating Clear Presentations
Speaking about Science: A Manual for Creating Clear Presentations
In an age when so much communication is tethered to technology, delivering messages face-to-face has paradoxically become even more vital to professional success. We all have ready access to more information than any of our ancestors did. At the click of a few keys, we can locate reams of facts on any topic under the sun. But...
Natural Hazards GIS-Based Spatial Modeling Using Data Mining Techniques (Advances in Natural and Technological Hazards Research)
Natural Hazards GIS-Based Spatial Modeling Using Data Mining Techniques (Advances in Natural and Technological Hazards Research)
This edited volume assesses capabilities of data mining algorithms for spatial modeling of natural hazards in different countries based on a collection of essays written by experts in the field. The book is organized on different hazards including landslides, flood, forest fire, land subsidence, earthquake, and gully erosion. Chapters were...
Disaster Recovery Gotchas - Watch Out For These Common Mistakes!
Disaster Recovery Gotchas - Watch Out For These Common Mistakes!

Information is power - you know that. But, how do you research the best Disaster Recovery strategies, without spending too much of your time (and money) on it? The average person earns $ 1100 per week, which equates to $ 27 per hour. Trying to do the research yourself would take you at least 5 hours to come up with the best information, AND...

Under Control: Governance Across the Enterprise
Under Control: Governance Across the Enterprise

With the economic crisis that began in 2008, a long-standing trend toward increased regulation is becoming a flood. The clamor for improved enterprise risk management and the complexity of multinational compliance present executives with a dramatically new array of challenges.

Governance should offer solutions, but it is clear that...

Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Video Systems in an IT Environment: The Essentials of Professional Networked Media
Video Systems in an IT Environment: The Essentials of Professional Networked Media
Audio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes technology reviews and the tools to understand and evaluate key aspects of hybrid AV...
JFK and the Unspeakable: Why He Died and Why It Matters
JFK and the Unspeakable: Why He Died and Why It Matters
BRAND NEW HARDBACKWe can know the essential truth of President John F. Kennedy's assassination. That truth can set us free.

Thanks to the pioneer investigators into President Kennedy's murder, the truth-telling of many witnesses, and a recent flood of documents through the JFK Records Act, the truth is available. Not only can the
...
Scalable Internet Architectures (Developer's Library)
Scalable Internet Architectures (Developer's Library)
As a developer, you are aware of the increasing concern amongst developers and site architects that websites be able to handle the vast number of visitors that flood the Internet on a daily basis. Scalable Internet Architecture addresses these concerns by teaching you both good and bad design methodologies for...
Cthulhu Cult
Cthulhu Cult

The Cult of Cthulhu shall never die. Its untenable spirit, unearthly and ichorous, is spreading far and wide through the Matrix-esque reality program that we are immersed in. As you read these words, try to wake up from the illusions surrounding you. This book is our manifesto, our truth, our bible! Cthulhu Cult is the integration of H.P....

Information Theory and Statistical Learning
Information Theory and Statistical Learning
This book presents theoretical and practical results of information theoretic methods used in the context of statistical learning. Its major goal is to advocate and promote the importance and usefulness of information theoretic concepts for understanding and developing the sophisticated machine learning methods necessary not only...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy