Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &...
High-performance Packet Switching Architectures
High-performance Packet Switching Architectures
Over the years, different architectures have been investigated for the design and implementation of high-performance switches. Particular architectures were determined by a number of factors based on performance, flexibility and available technology. Design differences were mainly a variation in the queuing functions and the switch core. The...
Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference
Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference

You're in charge of IT, facilities, or core operations for your organization when a hurricane or a fast-moving wildfire hits. What do you do?

Simple. You follow your business continuity/disaster recovery plan. If you've prepared in advance, your operation or your company can continue to conduct business while...

Beginning ASP.NET Databases Using VB.NET
Beginning ASP.NET Databases Using VB.NET
What you need to know

This book is for people who:

  • Have some experience of programming ASP.NET with Visual Basic® .NET
  • Are familiar with the operation of the .NET Framework
  • Want to learn how to use ASP.NET to make data-centric web applications

What you will learn from this...

Next Generation IPTV Services and Technologies
Next Generation IPTV Services and Technologies
Detailed coverage of the underlying technologies required to build an end-to-end IPTV system

The television entertainment industry is currently experiencing a major transformation as broadband subscribers and improvements in compression techniques for digital video content continue to grow. This growth is fueling the demand for a new generation...

Theory of Finite Automata With an Introduction to Formal Languages
Theory of Finite Automata With an Introduction to Formal Languages
It often seems that mathematicians regularly provide answers well before the rest of the world finds reasons to ask the questions. The operation of the networks of relays used in the first computers is exactly described by Boolean functions. George Boole thereby made his contribution to computer science in the mid-1800s, and Boolean algebra is used...
Managing the Testing Process
Managing the Testing Process

Practical ways to run a test operation that’s driven by quality – not crisis.

The wisdom in this book does not rely on brilliant theories or any Scientific Truth other than what works--on the job, time and time again. In Managing the Testing Process, you’ll examine an integrated approach–-the bricks...

Encyclopedia of Electronics Circuits, Volume 5
Encyclopedia of Electronics Circuits, Volume 5
The Encyclopedia of Electronic Circuits, Volume Vadds approximately 1000 new circuits to the treasury of carefully chosen circuits that cover nearly every phase of today's electronic technology. These five volumes contain a wealth of new ideas and up-to-date circuits garnered from prestigious industry sources. Also included are...
Calculus For Dummies
Calculus For Dummies

Calculus For Dummies, 2nd Edition (9781118791295) is now being published as Calculus For Dummies, 2nd Edition (9781119293491). While this version features an older Dummies cover and design, the content is the same as the new release and should not be considered a different product.

Slay the calculus monster with...

Samba: UNIX and NT Internetworking
Samba: UNIX and NT Internetworking
The target audience for this work includes systems programmers and administrators who are looking for assistance in implementing Samba in new and existing Windows and UNIX environments. A basic overview of both UNIX and Windows system and network architectures is provided to assist those readers whose primary background may be in one or the other...
Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats
Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats

Terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical failure—recent years have witnessed an increase in the number of natural disasters and man-made events that have threatened the livelihoods of businesses and organizations worldwide. Security Manager’s Guide to Disasters:...

Lean Integration: An Integration Factory Approach to Business Agility
Lean Integration: An Integration Factory Approach to Business Agility

Use Lean Techniques to Integrate Enterprise Systems Faster, with Far Less Cost and Risk

 

By some estimates, 40 percent of IT budgets are devoted to integration. However, most organizations still attack integration on a project-by-project basis,...

unlimited object storage image
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy