Home | Amazing | Today | Tags | Publishers | Years | Search 
A Decision Framework for Integrated Wetland-River Basin Management in a Tropical and Data Scarce Environment: UNESCO-IHE PhD Thesis
A Decision Framework for Integrated Wetland-River Basin Management in a Tropical and Data Scarce Environment: UNESCO-IHE PhD Thesis

Traditionally, wetlands were considered separately from river basin systems. However, nowadays it is becoming common practice to follow an integrated approach in wetland-riverine watershed analysis and management. Such approach requires not only adequate representations of all relevant bio-physical parameters, but also of socio-political and...

Space-Time Design of the Public City (Urban and Landscape Perspectives)
Space-Time Design of the Public City (Urban and Landscape Perspectives)

Time has become an increasingly important topic in urban studies and urban planning. The spatial-temporal interplay is not only of relevance for the theory of urban development and urban politics, but also for urban planning and governance. The space-time approach focuses on the human being with its various habits and routines in the city....

The Independence of Credit Rating Agencies: How Business Models and Regulators Interact
The Independence of Credit Rating Agencies: How Business Models and Regulators Interact

The Independence of Credit Rating Agencies focuses on the institutional and regulatory dynamics of these agencies, asking whether their business models give them enough independence to make viable judgments without risking their own profitability.

Few have closely examined the analytical methods of credit rating agencies,...

Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Overview

  • Learn sample forms and process flows for quick and easy use.
  • An easy-to-follow reference for implementing information security in the enterprise.
  • Learn...
Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond
Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond

Mobile computing skills are becoming standard in the IT industry

Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond is the ultimate reference for mobile computing. Certified Wireless Network Expert Robert J. Bartz guides IT and networking professionals through...

Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)
Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)

Since the pioneering work of Joseph Schumpeter (1942), it has been assumed that innovations typically play a key role in firms’ competitiveness.  This assumption has been applied to firms in both developed and developing countries. However, the innovative capacities and business environments of firms in developing countries are...

The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards
The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards

Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features...

Learning AirWatch
Learning AirWatch

Learn to implement, manage, and deploy the latest Enterprise Mobility Management (EMM) platform offered by AirWatch

About This Book

  • Understand Enterprise Mobility Management (EMM) and all the features involved in creating a robust deployment
  • Integrate and secure EMM solutions with your...
Getting Started with FortiGate
Getting Started with FortiGate

This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations.

Overview

  • Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of...
VMware vRealize Orchestrator Cookbook
VMware vRealize Orchestrator Cookbook

Master the configuration, programming, and interaction of plugins with Orchestrator to efficiently automate your VMware infrastructure

About This Book

  • Program with Orchestrator to automate and synchronize your infrastructure
  • Integrate the base plug-ins into your workflows
  • ...
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the...

Amazon S3 Cookbook
Amazon S3 Cookbook

Over 30 hands-on recipes that will get you up and running with Amazon Simple Storage Service (S3) efficiently

About This Book

  • Learn how to store, manage, and access your data with AWS SDKs
  • Study the Amazon S3 pricing model and learn how to calculate costs by simulating practical...
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy