Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCSE NG: Check Point Certified Security Expert Study Guide
CCSE NG: Check Point Certified Security Expert Study Guide
Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management II NG exam, 156-310. Written by two Check Point security experts who know exactly what it takes to pass the test, this Study Guide provides:
  • Assessment testing to focus and direct your studies
  • In-depth...
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Practice-Based Innovation: Insights, Applications and Policy Implications
Practice-Based Innovation: Insights, Applications and Policy Implications

The book describes and analyses the new environment for innovation, it does this with an emphasis on yet uncharted regions within the field of practice-based innovation, coming up with guidelines for innovation policy measures needed in order to realise this. While it focuses on these policies it also takes into account multi-actor innovation...

Digital Identity
Digital Identity

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval...

PHR/SPHR: Professional in Human Resources Certification Study Guide
PHR/SPHR: Professional in Human Resources Certification Study Guide

Whether you’re an HR professional seeking to validate the skills and knowledge acquired through years of practical experience or a relative newcomer to the HR field looking to strengthen your resume, the PHR and SPHR certifications from the Human Resource Certification Institute (HRCI) provide you with the means to do so. The PHR/SPHR:...

Microsoft Windows Vista Unleashed
Microsoft Windows Vista Unleashed
Microsoft® Windows® Vista™ Unleashed is a book for people, like you, who don’t consider themselves to be “average users.” It’s a book for anyone who finds that doing things the official way is slower, less efficient, and less powerful because Windows Vista was designed from the ground up to avoid confusing...
Remaking Global Order: The Evolution of Europe-China Relations and its Implications for East Asia and the United States
Remaking Global Order: The Evolution of Europe-China Relations and its Implications for East Asia and the United States

Relations between the European Union and China have grown at a sustained pace across the board in recent times, transforming the relationship from one of previous neglect into a matter of global strategic significance. This book offers an examination of the evolution of contemporary EU-China relations in the economic, technological and high...

C++ High Performance: Boost and optimize the performance of your C++17 code
C++ High Performance: Boost and optimize the performance of your C++17 code

Write code that scales across CPU registers, multi-core, and machine clusters

Key Features

  • Explore concurrent programming in C++
  • Identify memory management problems
  • Use SIMD and STL containers for performance improvement

Book...

Hitting the Wall: A Vision of a Secure Energy Future (Synthesis Lectures on Energy and the Environment: Technology, Science, and Society)
Hitting the Wall: A Vision of a Secure Energy Future (Synthesis Lectures on Energy and the Environment: Technology, Science, and Society)
Hitting the Wall examines the combination of two intractable energy problems of our age: the peaking of global oil production and the overloading of the atmosphere with greenhouse gases. Both emerge from the overconsumption of fossil fuels and solving one problem helps solve the other. The misinformation campaign about climate change is discussed...
Agricultural Biotechnology in International Development (Biotechnology in Agriculture Series)
Agricultural Biotechnology in International Development (Biotechnology in Agriculture Series)

Obtaining world food security and food self-reliance for the developing nations is a complex and difficult task, but with increased research and education, agricultural production in developing countries can be improved. Biotechnology applications, integrated into traditional systems, hold much promise in this respect. Realizing the positive...

The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards
The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards

Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy