Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fruit and Vegetable Gardening
Fruit and Vegetable Gardening

Whether you have a kitchen garden, a spot in a community garden, a small vegetable patch, or just a collection of pots and window boxes, Fruit & Vegetable Gardening is an essential, comprehensive guidebook for growing your own fruits and veggies.

Offering all the basics, from soil preparation and organic manures, to...

The Food Lover's Garden: Growing, Cooking, and Eating Well (Urban Homesteader Hacks)
The Food Lover's Garden: Growing, Cooking, and Eating Well (Urban Homesteader Hacks)

Grow it, cook it, eat it! From the vegetable patch to the dinner table

Put off by the origin-unknown, not-so-fresh, pesticide-laden offerings at the grocery store? Hungry for delicious high-quality veg and fragrant herbs, and looking to have some control over where your food comes from but never planted a seed in...

Practical Security: Simple Practices for Defending Your Systems
Practical Security: Simple Practices for Defending Your Systems

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and...

Oracle Data Guard 11gR2 Administration Beginner's Guide
Oracle Data Guard 11gR2 Administration Beginner's Guide

If you're an Oracle Database Administrator it's almost essential to know how to protect and preserve your data. This is the perfect primer to Data Guard that covers all the bases with a totally practical, user-friendly approach.

Overview

  • Understand the essentials and components of Oracle Data...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
Here's the book you need to prepare for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (70-299). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and...
Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA
SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA

For the day-to-day DBA, there are dangers around every corner; monsters waiting to strike down the unsuspecting database with a resource-hungry query, an inefficient data load, or even outright data corruption. When the worst happens, and SQL Server is down, or performance is suffering, customers are quick to complain.. During such difficult...

Comparing and Merging Files with GNU diff and patch
Comparing and Merging Files with GNU diff and patch
This manual describes how to use GNU diff and patch to compare and merge files.

GNU diff and patch are free software. The term "free software" is sometimes misunderstood — it has nothing to do with price. It is about freedom. It refers to your freedom to run, copy, distribute, study, change and improve the software. With
...
Genetic Algorithms in Electromagnetics
Genetic Algorithms in Electromagnetics
A thorough and insightful introduction to using genetic algorithms to optimize electromagnetic systems

Genetic Algorithms in Electromagnetics focuses on optimizing the objective function when a computer algorithm, analytical model, or experimental result describes the performance of an electromagnetic system. It...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy