Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Geoinformation: Remote Sensing, Photogrammetry and Geographic Information Systems, Second Edition
Geoinformation: Remote Sensing, Photogrammetry and Geographic Information Systems, Second Edition
Surveying and mapping has recently undergone a transition from discipline-oriented technologies, such as geodesy, surveying, photogrammetry and cartography, to the methodology-oriented integrated discipline of geoinformatics based on GPS positioning, remote sensing, digital photography for data acquisition, and GIS for data manipulation and data...
Oracle Enterprise Manager Grid Control 11g R1: Business Service Management
Oracle Enterprise Manager Grid Control 11g R1: Business Service Management

Oracle Enterprise Manager Grid Control is a release of Oracle Enterprise Manager that's used to model and manage the entire Oracle Grid and beyond. It has capabilities to manage a number of databases and application servers, and can manage multiple instances of Oracle deployment platforms. Business Service Management (BSM) is a...

Detail Process Charting: Speaking the Language of Process
Detail Process Charting: Speaking the Language of Process
Praise for Detail Process Charting

"A must-read for any competitive organization, Detail Process Charting: Speaking the Language of Process provides a comprehensive, yet clear, explanation of how to utilize one of the most powerful tools available to improve work processes. [Graham] has successfully integrated the history, success stories,...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

The Trend Following Bible: How Professional Traders Compound Wealth and Manage Risk
The Trend Following Bible: How Professional Traders Compound Wealth and Manage Risk

A proven approach to trading success based on the best commodity trading advisors

Profiting from long-term trends is the most common path to success for traders. The challenge is recognizing the emergence of a trend and determining where to enter and exit the market. The Trend Following Bible shows individual traders...

C++ Programming: Program Design Including Data Structures
C++ Programming: Program Design Including Data Structures

C++ PROGRAMMING: PROGRAM DESIGN INCLUDING DATA STRUCTURES, Sixth Edition remains the definitive text for the CS1/CS2 course sequence. D.S. Malik's time-tested, student-centered methodology uses a strong focus on problem-solving and full-code examples to vividly demonstrate the how and why of applying programming concepts and utilizing C++...

Architectural Design of Multi-Agent Systems: Technologies and Techniques (Premier Reference Series)
Architectural Design of Multi-Agent Systems: Technologies and Techniques (Premier Reference Series)
Multi-agent systems (MAS) have emerged as a new methodology to address the issues in organizing large-scale software systems. This methodology provides a conceptual model that helps maintaining constraints, a task conventional software engineering is unable to achieve. In recent years, MAS has been used in various areas in computer science and...
The SGML FAQ Book : Understanding the Foundation of HTML and XML (Electronic Publishing Series)
The SGML FAQ Book : Understanding the Foundation of HTML and XML (Electronic Publishing Series)
The SGML FAQ Book: Understanding the Foundation of HTML and XML is similar, but not quite the same kind of thing as an online FAQ or `Frequently Asked Questions' list. It addresses questions from people who already actually use SGML in some way (including HTML authors), and people who are about to use it. It deals mainly with issues...
Introducing UNIX and Linux (Grassroots)
Introducing UNIX and Linux (Grassroots)
UNIX is an operating system which has seen substantial growth in its popularity over the last few years and is used by many universities and colleges, as well as in industry. Linux is a UNIX-like operating system for PCs which is freely available and has become a serious alternative to proprietary systems such as Windows. This book is a...
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Oracle BPM Suite 11g Developer's cookbook
Oracle BPM Suite 11g Developer's cookbook
Organizations find that it's the business process that constitutes the heart of an enterprise and is a differentiating factor. They've found that it's the processes that make or break an enterprise. Operational efficiency is a differentiating factor, and research shows that it's the processes that provide operational...
unlimited object storage image
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy