Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Practical SQL: A Beginner's Guide to Storytelling with Data
Practical SQL: A Beginner's Guide to Storytelling with Data

Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. The book focuses on using SQL to find the story your data tells, with the popular open-source database PostgreSQL and the pgAdmin interface as...

Proceedings of the Workshop
Proceedings of the Workshop
The Workshop on Semigroups and Languages took place in November 2002 at Center of Algebra of the University of Lisbon. It aimed at bringing together researchers in both areas to find out about recent results of common interest.

Jorge Almeida (University of Porto, Portugal), John Fountain (University of York,
...
Translating Statistics to Make Decisions: A Guide for the Non-Statistician
Translating Statistics to Make Decisions: A Guide for the Non-Statistician

Examine and solve the common misconceptions and fallacies that non-statisticians bring to their interpretation of statistical results. Explore the many pitfalls that non-statisticians―and also statisticians who present statistical reports to non-statisticians―must avoid if statistical results are to be correctly used for...

Mastering ArcGIS Enterprise Administration: Install, configure, and manage ArcGIS Enterprise to publish, optimize, and secure GIS services
Mastering ArcGIS Enterprise Administration: Install, configure, and manage ArcGIS Enterprise to publish, optimize, and secure GIS services

Key Features

  • Install and configure the components of ArcGIS Enterprise to meet your organization's requirements
  • Administer all aspects of ArcGIS Enterprise through user interfaces and APIs
  • Optimize and Secure ArcGIS Enterprise to make it run efficiently and...
Sams Teach Yourself J2EE in 21 Days
Sams Teach Yourself J2EE in 21 Days

J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of...

Serious Games: Games That Educate, Train, and Inform
Serious Games: Games That Educate, Train, and Inform
Learn how to take the skills and knowledge you use to make games for entertainment to make serious games: games for education, training, healing, and more. ?Serious Games: Games That Educate, Train, and Inform? teaches game developers how to tap into the rapidly expanding market of serious games. Explore the numerous possibilities that serious...
The CISSP Prep Guide: Gold Edition
The CISSP Prep Guide: Gold Edition
An arsenal of inside information on CISSP and how to master the certification test!

More and more frequently, corporations are requiring that their employees provide professional certifications to prove that they possess the core competencies to do their technical jobs. The Certified Information Systems Security Professional examination (CISSP)...

Requirements Analysis: From Business Views to Architecture
Requirements Analysis: From Business Views to Architecture
The complete guide to requirements analysis for every system analyst and project team member.

Thousands of software projects are doomed from the start because they're based on a faulty understanding of the business problem that must be solved. The solution is effective requirements analysis. In Requirements Analysis: From Business Views to...

e-Transformation: Enabling New Development Strategies (Innovation, Technology, and Knowledge Management)
e-Transformation: Enabling New Development Strategies (Innovation, Technology, and Knowledge Management)

Could information and communication technology (ICT) become the transformative tool for a new style of global development? Could ICT promote knowledge-based, innovation-driven, and smart, adaptive, participatory development? As countries seek a way out of the present period of economic contraction, they are trying to weave ICT into their...

Environmental Regulations and Global Warming
Environmental Regulations and Global Warming

When the 2007 Nobel Peace Prize went to former Vice President Al Gore and an international scientific body that warned of serious consequences if Earth's temperatures continue to rise, the award underscored the international concern about the Earth's changing climate. Most scientists agree that global warming is a serious threat, and...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

unlimited object storage image
Result Page: 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy