Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Use of Force: A Thriller (The Scot Harvath Series)
Use of Force: A Thriller (The Scot Harvath Series)

“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy

From #1 New York Times bestselling author Brad Thor.

As a storm rages across the Mediterranean Sea, a
...

Who's Got Your Back: The Breakthrough Program to Build Deep, Trusting Relationships That Create Success--and Won't Let You Fail
Who's Got Your Back: The Breakthrough Program to Build Deep, Trusting Relationships That Create Success--and Won't Let You Fail

Disregard the myth of the lone professional “superman” and the rest of our culture’s go-it alone mentality. The real path to success in your work and in your life is through creating an inner circle of “lifeline relationships” – deep, close relationships with a few key trusted individuals who will offer the...

Oracle Enterprise Manager 10g Grid Control Handbook (Osborne ORACLE Press Series)
Oracle Enterprise Manager 10g Grid Control Handbook (Osborne ORACLE Press Series)

Let’s just look it right in the eye and call it out. We in the IT industries have been barraged with the buzzwords over and over again since we rolled into the new millennium: the transition to utility computing, or grid computing, or cloud computing (depending on the source/exact month/position of the stars in the sky). We’ve...

Pro Oracle Database 10g RAC on Linux: Installation, Administration, and Performance
Pro Oracle Database 10g RAC on Linux: Installation, Administration, and Performance
Real Application Clusters (RAC) and the Grid architecture are Oracle's strategy for scaling out enterprise systems to cope with bigger workloads and more users. Many books limit themselves by conceptualizing and theorizing about RAC technology, but this book is the first to portray implementing and administering an Oracle 10g RAC system in...
Handbook of Loss Prevention and Crime Prevention, Fourth Edition
Handbook of Loss Prevention and Crime Prevention, Fourth Edition
Security breaches, theft, and lack of resources due to natural or man-made disaster are all forms of corporate loss. The Handbook of Loss Prevention and Crime Prevention, Fourth Edition, shows how to avoid or minimize these losses with a wealth of practical information.
This revised volume brings together the expertise of
...
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project

Projects--especially complex ones--are inherently risky. Between time constraints, technical challenges, and resource issues, things can easily go wrong--making the identification of potential risks an essential component of every project manager's job. Fully updated and consistent with the Risk Management Professional (RMP) certification...

Oracle Database 11g Release 2 High Availability: Maximize Your Availability with Grid Infrastructure, RAC and Data Guard
Oracle Database 11g Release 2 High Availability: Maximize Your Availability with Grid Infrastructure, RAC and Data Guard

In the first edition of this book, we focused on what we called the "High Availability Database Administrator." However, that term led G to the question of just what is meant by High Availability? As a term bandied about among database administrators, this can have different meanings depending on who is interpreting it, who has to...

Oracle Database 10g High Availability with RAC, Flashback, and Data Guard (Osborne ORACLE Press Series)
Oracle Database 10g High Availability with RAC, Flashback, and Data Guard (Osborne ORACLE Press Series)
Attain real solutions for current availability challenges. Based on a “DBA-centric” approach to High Availability,Oracle Database 10g High Availability concentrates on explaining 10g technologies and practices to database administrators, covering general availability, real application clusters (RAC), disaster planning and...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)

Cisco® Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco...

Misbehavior in Organizations: Theory, Research, and Management (Applied Psychology Series)
Misbehavior in Organizations: Theory, Research, and Management (Applied Psychology Series)
Ideas for new constructs come from different sources. The idea for Organizational
Misbehavior (OMB) came from a surprise at being caught off guard. The incident
was recorded in Vardi’s personal file and is quoted from there. It happened
during the fall term of 1990 when he taught a course in an Executive MBA program
at
...
HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy