Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

Microsoft Visual C# 2008 Step by Step
Microsoft Visual C# 2008 Step by Step
Get the hands-on, step-by-step guide to learning the latest enhancements in Microsoft Visual C# 2008. Visual C#, one of the tools in Microsoft Visual Studio® 2008, is a modern programming language designed to deliver a productive environment for creating business frameworks and reusable object-oriented components. Whether you re a...
Windows Server 2008 All-In-One Desk Reference For Dummies (Computer/Tech)
Windows Server 2008 All-In-One Desk Reference For Dummies (Computer/Tech)

Covers the all-new Windows Server 2008!

Your one-stop guide to setting up, using, and maintaining Windows Server 2008

If, like many system administrators, you've been waiting impatiently for the arrival of Windows Server 2008, wait no more! It's here, and so is this book to help...

Usability: Turning Technologies into Tools
Usability: Turning Technologies into Tools
"The book contains much insight." --B. Hazeltine, Computing Reviews

"Unusual in that the research it brings together spans the perspectives of cognitive psychology, the sociology of work and technology, work-oriented systems design, computer-supported cooperative work, and human-computer interaction. Although most of
...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
NHibernate in Action
NHibernate in Action
In the classic style of Manning's "In Action" series, NHibernate in Action shows .NET developers how to use the NHibernate Object/Relational Mapping tool. This book is a translation from Java to .NET, as well as an expansion, of Manning's bestselling Hibernate in Action. All traces of Java have been carefully replaced by their .NET...
Textbook Finance: Leading Financial Professors From the World's Top Business Schools on the Fundamentals All Business Professionals Should Know About Finance
Textbook Finance: Leading Financial Professors From the World's Top Business Schools on the Fundamentals All Business Professionals Should Know About Finance
Inside the Minds: Textbook Finance is the most authoritative book ever written on the essentials of finance for the business professional. Featuring Chairmen of Finance Departments from some of the nation's leading Business Schools, these pages brim with insights from those at the height of their profession, who have each contributed chapters...
Fiber Based Dispersion Compensation (Optical and Fiber Communications Reports)
Fiber Based Dispersion Compensation (Optical and Fiber Communications Reports)

A pulse of light spreads in time as it propagates in a fiber due to the physical phenomenon called dispersion. While dispersion can be deleterious in optical communications systems, it can also be exploited to manage the temporal and spectral shapes of pulses and their interactions with other pulses. Much of dispersion control is realized in...

Linux Administration Handbook (2nd Edition)
Linux Administration Handbook (2nd Edition)
As the deployment of Linux systems in production environments has accelerated, Linux administrators have longed for a book that addresses the challenges of this complex and exciting frontier. Linux Administration Handbook was written with this audience in mind. This book serves both as a valuable tutorial for the novice administrator and as a...
Microsoft Excel 2000 Functions in Practice (Que Quick Reference)
Microsoft Excel 2000 Functions in Practice (Que Quick Reference)
The Microsoft Excel 2000 Functions in Practice provides in-depth information on the functions that will maximize your use of the analytical tools within Excel 2000. Packed with examples and detailed insight into both the functions and their uses, this reference includes more than just discussions of the functions—it offers practical,...
The Fearful Rise of Markets: Global Bubbles, Synchronized Meltdowns, and How To Prevent Them in the Future
The Fearful Rise of Markets: Global Bubbles, Synchronized Meltdowns, and How To Prevent Them in the Future

“This enjoyable, fast-moving book is concise, relevant, and perceptive. My bottom line is a simple one: This book should be read by all those interested in the way markets operate, be they investors, analysts, or policy makers.”

From the Foreword by Mohamed A....

Data Provenance and Data Management in eScience (Studies in Computational Intelligence)
Data Provenance and Data Management in eScience (Studies in Computational Intelligence)

This book covers important aspects of fundamental research in data provenance and data management(DPDM), including provenance representation and querying, as well as practical applications in such domains as clinical trials, bioinformatics and radio astronomy.

...
unlimited object storage image
Result Page: 587 586 585 584 583 582 581 580 579 578 577 576 575 574 573 572 571 570 569 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy