Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Ethical and Legal Issues in Human Resource Development: Evolving Roles and Emerging Trends
Ethical and Legal Issues in Human Resource Development: Evolving Roles and Emerging Trends

This book explores the role of HRD professionals in ethical and legal decision making in the workplace. While previous books have described the need for ethics in HRD, this book presents ways that HRD scholars and professionals can influence, through collaborative relationships, effective implementation of ethical policies and legal...

Tarot for Troubled Times: Confront Your Shadow, Heal Your Self & Transform the World
Tarot for Troubled Times: Confront Your Shadow, Heal Your Self & Transform the World

Out of Darkness Comes the Light of Transformation

Each of us has a shadow that darkens our inner and outer lives. In Tarot for Troubled Times, Shaheen Miro and Theresa Reed show us how working with the shadow—facing it directly, leaning into it rather than away—releases power that can free...

Theoretical and Empirical Analysis in Environmental Economics (New Frontiers in Regional Science: Asian Perspectives (34))
Theoretical and Empirical Analysis in Environmental Economics (New Frontiers in Regional Science: Asian Perspectives (34))
This monograph presents potential remedies for some of the current environmental issues in developed countries in a theoretical or empirical manner with the interdisciplinary approaches of economics, statistics, and engineering. The book illustrates effective economic and environmental policies for environmental challenges and factors...
Exploring C++ 11 (Expert's Voice in C++)
Exploring C++ 11 (Expert's Voice in C++)

Exploring C++ divides C++ up into bite-sized chunks that will help you learn the language one step at a time. Assuming no familiarity with C++, or any other C-based language, you’ll be taught everything you need to know in a logical progression of small lessons that you can work through as quickly or as slowly as you need.

...
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam

Get certified as an Azure architect by acing the 70-535 Architecting Microsoft Solutions (70-535) exam using this comprehensive guide with full coverage of the exam objectives

Key Features

  • Learn to successfully design and architect powerful solutions on the Azure Cloud platform
  • ...
Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

RabbitMQ Cookbook
RabbitMQ Cookbook

Knowing a reliable enterprise messaging system based on the AMQP standard can be an essential for today’s software developers. This cookbook helps you learn all the basics of RabbitMQ through recipes, code, and real-life examples.

Overview

  • Create scalable distributed applications with RabbitMQ
  • ...
Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond
Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond

Mobile computing skills are becoming standard in the IT industry

Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond is the ultimate reference for mobile computing. Certified Wireless Network Expert Robert J. Bartz guides IT and networking professionals through...

Traffic Grooming in Optical WDM Mesh Networks
Traffic Grooming in Optical WDM Mesh Networks
Traffic Grooming in Optical WDM Mesh Networks captures the state-of-the-art in the design and analysis of network architectures, protocols, and algorithms for implementing efficient traffic grooming in optical WDM mesh networks. Key topics include: - Static traffic grooming - Dynamic traffic grooming - Grooming models and policies - Grooming node...
Leveraging WMI Scripting (HP Technologies)
Leveraging WMI Scripting (HP Technologies)

Leveraging Scripting is the second in a series of two books dedicated to WMI. Understanding WMI, Lissoir’s first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed...

Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however,...
Result Page: 46 45 44 43 42 41 40 39 38 37 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy