Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks
alo Alto Networks, Inc. (NYSE: PANW) is an international cybersecurity organization located in Santa Clara, California. Its essential products include an integrated firewall framework and cloud-based offerings that expand sure firewalls to cover other protection issues. About 70,000 businesses in 150 countries utilize the...
The New Authoritarians: Convergence on the Right
The New Authoritarians: Convergence on the Right

The eighteen months between June 2016 and the end of 2017 saw the victory of Leave in Britain’s EU referendum, the election of Donald Trump as President of the United States, and unprecedented support for Marine Le Pen of the Front National in her campaign for the same office in France. Nearly a decade after the great financial...

Earthquake Engineering for Structural Design
Earthquake Engineering for Structural Design
Any structural engineer who must cope with seismic design will find this book a valuable resource. …The book is well written and each chapter contains an extensive list of references. The book would be appropriate as a resource in graduate-level structural design courses and for practicing structural engineers.
-CHOICE, Vol. 43 No. 10,
...
Heavy Metals In The Environment
Heavy Metals In The Environment
[In this book,] 48 eminently qualified professionals present a well-balanced discussion of the pertinent risk and benefit issues. What is presented is a factual analysis of the perspective that there are both nutritional and toxicological aspects that require consideration. … This book definitely provides valuable information in a very...
Handbook of Discrete and Combinatorial Mathematics
Handbook of Discrete and Combinatorial Mathematics
I like the book's format. There are glossaries at the beginning of each chapter. Each subsection begins with definitions and goes on to facts, then algorithms (boxed and in pseudo -code), lists of mathematical objects, illuminating pictures, examples, lists of applications, and, finally, bibliography and web sources. This handbook will appeal both...
The Hunt for Mount Everest
The Hunt for Mount Everest

The height of Mt. Everest was first measured in 1850, but the closest any westerner got to Everest during the next 71 years, until 1921, was 40 miles. The Hunt for Mt. Everest tells the story of the 71-year quest to find the world's highest mountain. It's a tale of high drama, of larger-than-life characters-George...

Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class...

Optimization and Data Analysis in Biomedical Informatics (Fields Institute Communications)
Optimization and Data Analysis in Biomedical Informatics (Fields Institute Communications)

​This volume covers some of the topics that are related to the rapidly growing field of biomedical informatics. In June 11-12, 2010 a workshop entitled ‘Optimization and Data Analysis in Biomedical Informatics’ was organized at The Fields Institute. Following this event invited contributions were gathered based on the talks...

Guide to the Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)
Guide to the Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)

Guide to the Wiring Regulations

17th Edition IEE Wiring Regulations (BS 7671: 2008)

Darrell Locke IEng MIEE ACIBSE, Electrical Contractors' Association, UK

Essential for electrical installers and installation...

Logic-Based Artificial Intelligence
Logic-Based Artificial Intelligence

This landmark volume represents the culmination of over 40 years of research in the use of logic as a basis for representing and manipulating problems in the field of artificial intelligence. The use of logic as a basis for commonsense reasoning was started by John McCarthy in 1959. The collection consists of both original research and...

Internet Babylon: Secrets, Scandals, and Shocks on the Information Superhighway
Internet Babylon: Secrets, Scandals, and Shocks on the Information Superhighway

* Looks at the Internet from a morbid, sordid, entertaining perspective rather than a technical how-to perspective

* Makes the Internet fun, fascinating, and non-intimidating for casual users.

* Focuses on well-known actors, politicians, performing artists, and other public figures and how they have been treated...

Agent and Multi-Agent Systems: Technologies and Applications: First KES International Symposium, KES-AMSTA 2007, Wroclaw
Agent and Multi-Agent Systems: Technologies and Applications: First KES International Symposium, KES-AMSTA 2007, Wroclaw
This book constitutes the refereed proceedings of the First International Symposium on Agent and Multi-Agent Systems - Technologies and Applications, KES-AMSTA 2007, held in Wroclaw, Poland in May/June 2007. China in November 2006.

The 110 revised papers presented were carefully reviewed and selected from 464 submissions and contain 4 papers...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy