Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Macroeconomic Policy in Fragile States
Macroeconomic Policy in Fragile States
Setting macroeconomic policy is especially difficult in fragile states. Political legitimacy concerns are heightened, raising issues such as who the policymakers are, what incentives they face, and how the process of policymaking is likely to work under limited legitimacy and high uncertainty
both about the macroeconomic environment
...
Secure Messaging with Microsoft  Exchange Server 2003
Secure Messaging with Microsoft Exchange Server 2003

Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...

Red Hat Linux Security and Optimization
Red Hat Linux Security and Optimization
Your Official Red Hat® Linux® Guide to Security and Optimization Reviewed and approved by the experts at Red Hat, this comprehensive guide delivers the know-how you need to improve the performance of your Red Hat Linux system—and protect it from attacks and break-ins. Red Hat Linux expert Mohammed Kabir starts by...
Cisco Network Professional's Advanced Internetworking Guide
Cisco Network Professional's Advanced Internetworking Guide
Ideal for any IT professional who uses Cisco technologies on a daily basis, or anyone who is preparing for their Cisco Certified Network Professional (CCNP) certification.

The topics covered will be more in depth than other introductory-level books of similar topics, and will span from layer 2 technologies such as switching, STP,...

Effective C# (Covers C# 4.0): 50 Specific Ways to Improve Your C#, Second Edition (2nd Edition)
Effective C# (Covers C# 4.0): 50 Specific Ways to Improve Your C#, Second Edition (2nd Edition)

C# has matured over the past decade: It’s now a rich language with generics, functional programming concepts, and support for both static and dynamic typing. This palette of techniques provides great tools for many different idioms, but there are also many ways to make mistakes. In Effective C#, Second...

Homebuyers Beware: Who's Ripping You Off Now?
Homebuyers Beware: Who's Ripping You Off Now?

Get the Best Mortgage Deal in Today’s Real Estate Markets--and Avoid a Whole New Generation of Scams! 

  • Exposes new secrets, lies, and scams the mortgage industry doesn’t want you to know about
High Performance ASIC Design: Using Synthesizable Domino Logic in an ASIC Flow
High Performance ASIC Design: Using Synthesizable Domino Logic in an ASIC Flow

This book stems from my experience over the last few years in designing high-speed digital logic using ASIC design flows. I discovered that while it is possible to significantly improve performance in ASIC implementations with deep pipelining and careful physical design, a speed penalty still had to be paid due to their exclusive use of...

Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand

The 2010 Asian Conference on Computer Vision took place in the southern hemisphere, in “The Land of the Long White Cloud” in Maori language, also known as New Zealand, in the beautiful town of Queenstown. If we try to segment the world we realize that New Zealand does not belong officially to any continent. Similarly, in computer...

The Best of Verity Stob: Highlights of Verity Stob's Famous Columns from .EXE, Dr. Dobb's Journal, and The Register
The Best of Verity Stob: Highlights of Verity Stob's Famous Columns from .EXE, Dr. Dobb's Journal, and The Register

Verity Stob is the comedienne of the programming world. She has been writing satirical chronicles of techie life since 1988. Her column first appeared in the legendary .EXE Magazine, then Dr. Dobbs' Journal, and it now graces The Register.

For the first time, the very best of Stob's...

Radiation Physics for Medical Physicists (Biological and Medical Physics, Biomedical Engineering)
Radiation Physics for Medical Physicists (Biological and Medical Physics, Biomedical Engineering)

This book summarizes the radiation physics knowledge that professionals working in medical physics need to master for efficient and safe dealings with ionizing radiation. It contains eight chapters, each chapter covering a specific group of subjects related to radiation physics and is intended as a textbook for a course in radiation physics...

Voice of the Customer: Capture and Analysis (Six SIGMA Operational Methods)
Voice of the Customer: Capture and Analysis (Six SIGMA Operational Methods)

Discover All the Advantages of Using Design for Six Sigma to Develop and Build Customer Value-Based Products

Voice of the Customer Capture and Analysis equips Six Sigma you with the skills needed to create and deploy surveys, capture real customers need with ethnographic methods, immediately analyze the results, and...

Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
unlimited object storage image
Result Page: 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy