Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Panderer to Power: The Untold Story of How Alan Greenspan Enriched Wall Street and Left a Legacy of Recession
Panderer to Power: The Untold Story of How Alan Greenspan Enriched Wall Street and Left a Legacy of Recession

Praise For PANDERER TO POWER

“We all owe a great debt to Fred Sheehan. Fred demolishes the myth of Alan Greenspan’s omniscience, while revealing the dangerous credulity of those who set him on a pedestal above the rest of us. Panderer to Power will be invaluable in making the case for how we might...

Air Pollution: Sources, Impacts and Controls
Air Pollution: Sources, Impacts and Controls
The problem of air pollution has become a global issue, driven by rapid economic growth, industrialization, and urbanization. Pollutants directly emitted into the atmosphere include nitrogen oxides, carbon monoxide, sulphur oxides, particulate matter (PM), volatile organic compounds, carbonaceous particles, dust, and sea-salt. Secondary...
IP Storage Networking: Straight to the Core
IP Storage Networking: Straight to the Core

"For those considering network storage consolidation, Straight to the Core walks the reader through both the how and why of IP and Ethernet's flexibility." Larry Boucher, CEO Alacritech

"A forward-looking work with excellent technical content. Orenstein knows his stuff. ...enough technical meat to satisfy the engineers and...

Gender Issues and Sexuality: Essential Primary Sources
Gender Issues and Sexuality: Essential Primary Sources

Gender Issues and Sexuality: Essential Primary Sources provides insight into the personal, social, and political issues of gender and sexuality—issues that range from what many hold as intimate matters of personal belief to matters that stir, shake, and thus profoundly shape modern society.

The women’s rights and gay...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data...
Novell ZENworks 7 Suite Administrator's Handbook
Novell ZENworks 7 Suite Administrator's Handbook

IT professionals are constantly asked to get more done with fewer resources. Our lives are often spent doing mundane tasks such as hauling mounds of CDs around so we can install applications on our user's computer, re-installing operating systems, or trying to figure out where all of our assets are. We could get on with the more...

Getting Started with Microsoft Lync Server 2013
Getting Started with Microsoft Lync Server 2013

Lync 2013 is a product that enables users to IM, and have audio and video conferences, including multi-party video. The mobile client permits the use of all the features in every device with an access-from-everywhere logic. The company’s Active Directory users, SharePoint documents, and Exchange objects integrate with Lync to deliver...

Eliminating Waste in Business: Run Lean, Boost Profitability
Eliminating Waste in Business: Run Lean, Boost Profitability

Redundant employees. Storerooms full of extra stock "in case we need it." Marketing money sprayed in all directions in the vain hope it will create customers. Duplicate IT systems. HR policies that fatten the corporate waistline rather than keeping it trim. Budgeting exercises that result in "more of the same, plus...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Power Plays: Energy Options in the Age of Peak Oil
Power Plays: Energy Options in the Age of Peak Oil

Many people wonder: Are we really running out of oil, or is it all a ruse to drive prices up? Is nuclear power safe and economical? Is solar energy really the key to providing plenty of carbon-free energy? Do we have enough natural gas or coal to make any loss of oil production irrelevant?

In Power Plays: Energy Options in the...

IP Quality of Service (Cisco Networking Fundamentals)
IP Quality of Service (Cisco Networking Fundamentals)
The complete resource for understanding and deploying IP quality of service for Cisco networks

Learn to deliver and deploy IP QoS and MPLS-based traffic engineering by understanding:

  • QoS fundamentals and the need for IP QoS
  • The Differentiated Services QoS architecture and its enabling QoS functionality...
Traffic Grooming in Optical WDM Mesh Networks
Traffic Grooming in Optical WDM Mesh Networks
Traffic Grooming in Optical WDM Mesh Networks captures the state-of-the-art in the design and analysis of network architectures, protocols, and algorithms for implementing efficient traffic grooming in optical WDM mesh networks. Key topics include: - Static traffic grooming - Dynamic traffic grooming - Grooming models and policies - Grooming node...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy