Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Active Directory Domain Services 2008 How-To
Active Directory Domain Services 2008 How-To

Need fast, reliable, easy-to-implement solutions for Microsoft Active Directory 2008? This book delivers exactly what you’re looking for. You’ll find nearly 250 tested, step-by-step procedures for planning, installing, customizing, and managing Active Directory Domain Services (AD DS) in any production...

OpenStack Cloud Computing Cookbook
OpenStack Cloud Computing Cookbook
OpenStack is an open source software for building public and private clouds, born from Rackspace and NASA. It is now a global success and is developed and supported by scores of people around the globe and backed by some of the leading players in the cloud space today. This book is specifically designed to quickly help you get up...
Introducing Azure Kubernetes Service: A Practical Guide to Container Orchestration
Introducing Azure Kubernetes Service: A Practical Guide to Container Orchestration
This book is a practical guide to Microsoft’s Azure Kubernetes Service (AKS), a container orchestration platform. The goal of this book is to take the reader from 0 to 100 deploying and running a Kubernetes cluster on Microsoft Azure cloud. For anyone embarking on this book, it is ideal to have experience in the...
Representations and Techniques for 3D Object Recognition & Scene Interpretation
Representations and Techniques for 3D Object Recognition & Scene Interpretation

3D scene understanding and object recognition are among the grandest challenges in computer vision. A wide variety of techniques and goals, such as structure from motion, optical flow, stereo, edge detection, and segmentation, could be viewed as subtasks within scene understanding and recognition. Many of these applicable methods are...

As You Were
As You Were
"A book that alternates between grim reality and ribald humor. The hard hits come fast. ... An incandescent addition to both Native American letters and the literature of the Iraq and Afghan wars." -Kirkus starred review

When he learns his father is dying, David Tromblay ponders what will become of the...

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
Your step-by-step guide to creating authentication processes that assure compliance

To comply with Sarbanes-Oxley Section 404, you must design an information technology infrastructure that can protect the privacy and access integrity of your data, particularly online, while not restricting business activity. This book shows you how to do that,...

Information Security Management Handbook, Sixth Edition (Isc2 Press)
Information Security Management Handbook, Sixth Edition (Isc2 Press)
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion...
Place and Identity: The Performance of Home (Routledge Focus on Housing and Philosophy)
Place and Identity: The Performance of Home (Routledge Focus on Housing and Philosophy)

The UK is experiencing a housing crisis unlike any other. Homelessness is on the increase and more people are at the mercy of landlords due to unaffordable housing. Place and Identity: Home as Performance highlights that the meaning of home is not just found within the bricks and mortar; it is constructed from the network of...

Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is...

The Handbook of Diasporas, Media, and Culture (Global Handbooks in Media and Communication Research)
The Handbook of Diasporas, Media, and Culture (Global Handbooks in Media and Communication Research)

A multidisciplinary, authoritative outline of the current intellectual landscape of the field.

Over the past three decades, the term ‘diaspora’ has been featured in many research studies and in wider theoretical debates in areas such as communications, the humanities, social sciences, politics, and...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy