Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managerial Leadership
Managerial Leadership
I remember talking in 1995 with Bob Staton, CEO of Colonial Life & Accident Insurance Company, a division of UNUM, about the lack of leadership throughout the company. Colonial was one of the few large, homegrown companies in Columbia, South Carolina, when it was acquired by UNUM, the Maine-based disability insurance...
Oral Cavity Reconstruction
Oral Cavity Reconstruction

Standing as the most comprehensive reference on oral cancer reconstruction, this handbook serves as an all-encompassing compendium of surgical and cosmetic strategies for the reconstruction of bone, muscles, nerves, arteries, and anatomical structures of the oral cavity- covering wounds extending from the lips to the pharynx with detailed...

Baby Boomers and Hearing Loss: A Guide to Prevention and Care
Baby Boomers and Hearing Loss: A Guide to Prevention and Care

In Baby Boomers and Hearing Loss, audiologist John Burkey shows readers how they can continue to enjoy youthful living, regardless of whether their hearing abilities are undiminished or severely compromised. In a reassuring and straightforward style, Burkey explains the typical causes of hearing loss, from genetic factors to...

Getting to Know Vue.js: Learn to Build Single Page Applications in Vue from Scratch
Getting to Know Vue.js: Learn to Build Single Page Applications in Vue from Scratch

Learn how to render lists of items without repeating your code structure and how to work with conditional rendering items and event handling. Containing all you need to know to get started with Vue.js, this book will take you through using build tools (transpile to ES5), creating custom components, state management, and...

Mobile IPv6: Protocols and Implementation
Mobile IPv6: Protocols and Implementation

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.). 

This book covers the IPv6 host mobility protocol known as "mobile IPv6"...

HTML5 and JavaScript Projects (Expert's Voice in Web Development)
HTML5 and JavaScript Projects (Expert's Voice in Web Development)

HTML5 and JavaScript Projects shows you how to build on your basic knowledge of HTML5 and JavaScript to create substantial HTML5 applications. Through the many interesting projects you can build in this book, you'll build your HTML5 skills for your future projects, and extend the core skills you may have learned with...

Ansible Configuration Management
Ansible Configuration Management

Configuring your Linux infrastructure using Ansible is made logical and highly accessible when you follow this step-by-step tutorial. Combining a clear overview with the deeper details, it gives a solid grounding to managing your systems.

Overview

  • Starts with the most simple usage of Ansible and builds on...
Hands-On DevOps with Vagrant: Implement end-to-end DevOps and infrastructure management using Vagrant
Hands-On DevOps with Vagrant: Implement end-to-end DevOps and infrastructure management using Vagrant

Use Vagrant to easily build complete development environments

Key Features

  • Implement DevOps with Vagrant effectively
  • Integrate Vagrant with different tools such as Puppet, Chef, and Docker
  • Manage infrastructure with a practical approach

...

Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Learn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.

After a chapter explaining the most...

Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

Emerging Wireless Multimedia: Services and Technologies
Emerging Wireless Multimedia: Services and Technologies
The provision of IP-based multimedia services is one of the most exiting and challenging aspects of next generation wireless networks. A significant evolution has been underway for enabling such multimedia services and for ultimately migrating the Internet to the wireless world. This book examines this evolution, looking at an array of the most...
Professional Windows PowerShell (Programmer to Programmer)
Professional Windows PowerShell (Programmer to Programmer)
Professional Windows® PowerShell

Forget everything you know about the Windows command line because you're about to enter a whole new ballgame. Windows PowerShell provides a new environment for interactive exploration and administration of Windows machines that's different from and more consistent than what you've previously used on Windows...

unlimited object storage image
Result Page: 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy