Home | Amazing | Today | Tags | Publishers | Years | Search 
OpenStack Cloud Computing Cookbook
OpenStack Cloud Computing Cookbook
OpenStack is an open source software for building public and private clouds, born from Rackspace and NASA. It is now a global success and is developed and supported by scores of people around the globe and backed by some of the leading players in the cloud space today. This book is specifically designed to quickly help you get up...
Euroscepticism: Party Politics, National Identity and European Integration (European Studies 20)
Euroscepticism: Party Politics, National Identity and European Integration (European Studies 20)

The accelerated pace of European integration since the early 1990s has been accompanied by the emergence of increasingly prominent and multiform oppositions to the process. The term Euroscepticism has appeared with growing frequency in a range of political, media, and academic discourses. Yet, the label is applied to a wide range of...

Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Exam Ref 70-417: Upgrading Your Skills to MCSA Windows Server 2012
Exam Ref 70-417: Upgrading Your Skills to MCSA Windows Server 2012

Prepare for Exam 70-417—and help demonstrate your real-world mastery of Windows Server 2012 core infrastructure services. Microsoft Exam 70-417 is an upgrade exam that is a composite of three standalone exams: 70-410, 70-411, and 70-412. Exam 70-417 validates skills related to the core technology features and functionality of...

Information Security For The Little Guy
Information Security For The Little Guy
Being secure in an insecure world is a tough nut to crack. There are so many ways that our personal information can be stolen and duplicated today it is a very serious situation and should be taken very seriously.

From our surfing the Internet to just the simplicity of speaking on a cell phone to our friends can
...
Portrait of a Killer: Jack the Ripper -- Case Closed
Portrait of a Killer: Jack the Ripper -- Case Closed

The number-one New York Times-bestselling novelist Patricia Cornwell is known the world over for her brilliant storytelling, the courage of her characters, and the state-of-the-art forensic methods they employ.

In this headline-making new work of nonfiction, Cornwell turns her trademark skills for meticulous research
...

Schaum's Outline of Trigonometry
Schaum's Outline of Trigonometry
In revising the second edition, the strengths of the prior editions were retained while reflecting the changes in the study of trigonometry during the last ten years. This edition deletes the use of logarithms entirely, increases the use of calculators, and changes from the column form of working identity problems to the horizontal...
End-of-Life Communication in the ICU: A Global Perspective
End-of-Life Communication in the ICU: A Global Perspective
The world is composed of multiple, diverse populations of different race, culture, and religion. Increasingly, these populations are mixing and intermingling, both physically with faster and cheaper air travel, and mentally via communication systems, including the Internet. Knowledge of other countries, cultures, and continents...
Programming Languages and Systems: 7th European Symposium on Programming, ESOP'98, Held as Part of the Joint European Conferences on Theory
Programming Languages and Systems: 7th European Symposium on Programming, ESOP'98, Held as Part of the Joint European Conferences on Theory
The European conference situation in the general area of software science has long been considered unsatisfactory. A fairly large number of small and mediumsized conferences and workshops take place on an irregular basis, competing for high-quality contributions and for enough attendees to make them financially viable....
Forensic Pathology of Trauma (Forensic Science and Medicine)
Forensic Pathology of Trauma (Forensic Science and Medicine)
The practice of forensic pathology includes the collection and analysis of evidence in relation to a corpse in order to establish the cause of death. Knowledge of the cause of death contributes to the determination of the manner of death by medical examiners and coroners, who are occasionally assisted by law enforcement officers. In...
You Are a Brand!: In Person and Online, How Smart People Brand Themselves for Business Success
You Are a Brand!: In Person and Online, How Smart People Brand Themselves for Business Success

Celebrity entertainers, star athletes, and corporate icons didn't accidentally wind up at the top - they branded their way there. Now you, too, can leverage the power of a personal brand, harness your potential and take charge of your career. Using strategies from the playbook of the Mad Men of Madison Avenue, advertising guru Catherine...

Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Liars and Outliers: Enabling the Trust that Society Needs to Thrive

Just today, a stranger came to my door claiming he was here to unclog a bathroom drain. I let him into my house without verifying his identity, and not only did he repair the drain, he also took off his shoes so he wouldn’t track mud on my floors. When he was done, I gave him a piece of paper that asked my bank to give him some money....

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy