Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mike Meyers' A+ Guide: PC Technician (Exams 220-602, 220-603 & 220-604)
Mike Meyers' A+ Guide: PC Technician (Exams 220-602, 220-603 & 220-604)
Essential Skills for a Successful IT Career

Mike Meyers, the leading authority on CompTIA A+ training and certification, has helped hundreds of thousands of people master the skills covered on the CompTIA A+ exams--and now he can help you, too. Completely updated for the new CompTIA A+ standards, Mike Meyers' CompTIA...

MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217) is the perfect study guide to help you pass one of the four core exams in Microsoft's Windows 2000 certification program. This certification exam measures the ability to install, configure, and troubleshoot the Windows 2000 Active Directory components, DNS for...
Disadvantaged Children in India: Empirical Evidence, Policies and Actions
Disadvantaged Children in India: Empirical Evidence, Policies and Actions
This book addresses issues concerning five major categories of disadvantaged children, namely street children, children involved in trafficking, child labor, slum children, and children in institutional care, which apply to a large number of children around the world, including India. Compiling primary and secondary research-based evidences in...
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
Xenobiotics in the Urban Water Cycle: Mass Flows, Environmental Processes, Mitigation and Treatment Strategies (Environmental Pollution)
Xenobiotics in the Urban Water Cycle: Mass Flows, Environmental Processes, Mitigation and Treatment Strategies (Environmental Pollution)

The presence of xenobiotics in the aquatic environment is seen as one of the biggest challenges for a sustainable water future. Thus, there is a need to understand, in an integrated manner, the sources, flow paths, fate and effects of xenobiotics in the urban water cycle.

This book is an authoritative and comprehensive reference source...

Rabies
Rabies

Rabies offers a complete account of one of the oldest known diseases threatening public health today. Unlike most research-oriented descriptions of rabies, this book provides a narrative about the disease and its etiologic agent, encompassing the historical background to recent developments. The emphasis on the basic biology and...

Rough  Granular Computing in Knowledge Discovery and Data Mining (Studies in Computational Intelligence)
Rough Granular Computing in Knowledge Discovery and Data Mining (Studies in Computational Intelligence)

The book "Rough-Granular Computing in Knowledge Discovery and Data Mining" written by Professor Jaroslaw Stepaniuk is dedicated to methods based on a combination of the following three closely related and rapidly growing areas: granular computing, rough sets, and knowledge discovery and data mining (KDD). In the book, the KDD...

Incident Response: A Strategic Guide to Handling System and Network Security Breaches
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
The increasing complexity and diversity of systems, applications, and networks has made them more difficult to defend. As companies continue to experience losses due to security breaches, security professionals must take a new approach in protecting their assets. By using monitoring and detection measures with prompt intervention, you can...
Mac OS X Help Line, Tiger Edition
Mac OS X Help Line, Tiger Edition
With every update, Mac OS X grows more powerful, more dependable, and easier to use--and Mac OS X Tiger is no exception. But along with the new features come fresh issues--new areas to troubleshoot, new functionality to unravel, and new glitches waiting to confound even the savviest Mac users. Not to worry. Best-selling author and Mac guru Ted...
Chemical Process Safety: Learning from Case Histories
Chemical Process Safety: Learning from Case Histories
"Given his extensive background in an industrial setting as a team leader at the PPG Chlor-Alkali Plant in Louisiana and the safety course that he taught for AIChE with the well-known safety expert Trevor Kletz, the quantity of information of a practical nature contained in this book is not surprising."
 - Gary Bennett,
...
Microsoft Outlook 2007 Bible
Microsoft Outlook 2007 Bible
Discover all the ways Outlook can make your life easier

Outlook has been called the Swiss army knife of applications, and with good reason. In one handy package, you get the tools you use constantly—e-mail, a calendar and appointment book, a contacts list, a to-do list, and more. Learn to use them together, and you have a sophisticated...

Post-mining of Association Rules: Techniques for Effective Knowledge Extraction
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction

Since its introduction for market basket analysis in the early 1990s, association rule mining has had a lot of research attention, and it is now widely used in many fields, for example in retail, telecom, insurance, and bioinformatics applications.

One familiar problem encountered in association mining exercises is that they...

unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy