Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...

Learn Keras for Deep Neural Networks: A Fast-Track Approach to Modern Deep Learning with Python
Learn Keras for Deep Neural Networks: A Fast-Track Approach to Modern Deep Learning with Python

Learn, understand, and implement deep neural networks in a math- and programming-friendly approach using Keras and Python. The book focuses on an end-to-end approach to developing supervised learning algorithms in regression and classification with practical business-centric use-cases implemented in Keras.

The overall...

Ventilatory Support and Oxygen Therapy in Elder, Palliative and End-of-Life Care Patients
Ventilatory Support and Oxygen Therapy in Elder, Palliative and End-of-Life Care Patients

This book provides readers with a comprehensive and up-to-date guide to non-invasive mechanical ventilation in palliative medicine, focusing on why and when it may be necessary. Physicians will find a practical guide to this specific context, particularly focused on pulmonary function and physiology in the elderly, and on ventilatory...

Disadvantaged Children in India: Empirical Evidence, Policies and Actions
Disadvantaged Children in India: Empirical Evidence, Policies and Actions
This book addresses issues concerning five major categories of disadvantaged children, namely street children, children involved in trafficking, child labor, slum children, and children in institutional care, which apply to a large number of children around the world, including India. Compiling primary and secondary research-based evidences in...
Titanium Microalloyed Steel: Fundamentals, Technology, and Products
Titanium Microalloyed Steel: Fundamentals, Technology, and Products
This book comprehensively reviews the research on Ti microalloyed steel, focusing on development and production technology. It discusses steel composition design and performance, as well as technologies for controlling the microstructure and properties of Ti microalloyed steel during the production process. Ti can significantly improve...
Electromagnetic Fields and Waves: Microwave and mmWave Engineering with Generalized Macroscopic Electrodynamics (Textbooks in Telecommunication Engineering)
Electromagnetic Fields and Waves: Microwave and mmWave Engineering with Generalized Macroscopic Electrodynamics (Textbooks in Telecommunication Engineering)
This textbook is intended for a course in electromagnetism for upper undergraduate and graduate students. The main concepts and laws of classical macroscopic electrodynamics and initial information about generalized laws of modern electromagnetics are discussed, explaining some paradoxes of the modern theory. The reader then gets acquainted...
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCNP Data Center Application Centric...
Hibernate: A J2EE™ Developer's Guide
Hibernate: A J2EE™ Developer's Guide
Build fast, high-performance Java database applications with Hibernate.

Hibernate makes it far easier to build robust, high-performance database applications with Java. Now there's a practical, hands-on guide to using Hibernate's flexible, fast object/relational persistence and query services. Will Iverson covers every facet of...

Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
This book had its genesis in June 1996 when the Wharton Risk
Management and Decision Processes Center (Wharton Risk Center) co-hosted
a conference on “Information Technology and Its Impact on Catastrophic
Risks”. It was one of the events that year celebrating the Anniversary of
the first computer (ENIAC) at the
...
BEA WebLogic Workshop 8.1 Kick Start: Simplifying Java Web Applications and J2EE
BEA WebLogic Workshop 8.1 Kick Start: Simplifying Java Web Applications and J2EE

BEA WebLogic Workshop 8.1 Kick Start shows you how to make J2EE programming easier, providing the fastest path to productivity with BEA WebLogic Workshop 8.1. The authors show how Workshop leverages the power of BEA WebLogic Platform 8.1, including WebLogic Server, WebLogic Portal, and...

Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways...
unlimited object storage image
Result Page: 825 824 823 822 821 820 819 818 817 816 815 814 813 812 811 810 809 808 807 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy