Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Out of the Gobi: My Story of China and America
Out of the Gobi: My Story of China and America
Foreword by Janet Yellen

Weijian Shan's Out of the Gobi is a powerful memoir and commentary that will be one of the most important books on China of our time, one with the potential to re-shape how Americans view China, and how the Chinese view life in America.

Shan, a former hard laborer
...
Getting Started with oVirt 3.3
Getting Started with oVirt 3.3

A practical guide to successfully implementing and calibrating oVirt 3.3, a feature-rich, open source server virtualization platform

Overview

  • Understand and master the internal arrangement of oVirt
  • Quickly install and configure the oVirt virtualization environment
  • Create your...
Electronic Government: Design, Applications and Management
Electronic Government: Design, Applications and Management
The concept of electronic government (eGov), sometimes electronic governance, is about to emerge from a practitioners’ concept to one that also attracts research. Conferences abound, and research scales up from individual researchers and projects to institutes, both those governed by industry, such as IBM’s Institute for Electronic...
Life Cycle of Clusters in Designing Smart Specialization Policies (SpringerBriefs in Applied Sciences and Technology)
Life Cycle of Clusters in Designing Smart Specialization Policies (SpringerBriefs in Applied Sciences and Technology)
This book investigates cluster-life-cycle (CLC) analysis to inform the entrepreneurial discovery process (EDP), in order to support the effectiveness of the smart specialization strategy (S3). It focuses on the evolutionary analysis of clusters’ development stages (emergence, development, maturity, decline/transformation), highlighting how...
Studying Foreign Policy Comparatively: Cases and Analysis (New Millennium Books in International Studies)
Studying Foreign Policy Comparatively: Cases and Analysis (New Millennium Books in International Studies)
What is foreign policy? What do we know about why states pursue certain foreign policies and not others? What factors go into the shaping of foreign policy? Studying Foreign Policy Comparatively, Fourth Edition (formerly titled The New...
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference

The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.

Identity management is put...

The Nature of Revolution: Art and Politics under the Khmer Rouge
The Nature of Revolution: Art and Politics under the Khmer Rouge
The Nature of Revolution provides the first account of art and politics under the brutal Khmer Rouge regime in Cambodia. James A. Tyner repositions Khmer Rouge artworks within their proper political and economic context: the materialization of a political organization in an era of anticolonial and decolonization movements....
Practice of System and Network Administration, The (2nd Edition)
Practice of System and Network Administration, The (2nd Edition)
The first edition of The Practice of System and Network Administration introduced a generation of system and network administrators to a modern IT methodology. Whether you use Linux, Unix, or Windows, this newly revised edition describes the essential practices previously handed down only from mentor to...
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the...
Geopositioning and Mobility (ISTE)
Geopositioning and Mobility (ISTE)

This book presents a general overview of the applications and use of geopositioning and GNSS for assisting the supervision and management of mobile terrestrial professions, information, traffic regulation, multimodal information, pedestrian mobility and indoor geopositioning, etc. It especially focuses on the field of mobility and terrestrial...

Search for the Ultimate Energy Source: A History of the U.S. Fusion Energy Program (Green Energy and Technology)
Search for the Ultimate Energy Source: A History of the U.S. Fusion Energy Program (Green Energy and Technology)

Why has the clean, limitless energy promised by fusion always seemed just out of reach?

Search for the Ultimate Energy Source: A History of the U.S. Fusion Energy Program, explains the fundamentals and concepts behind fusion power, and traces the development of fusion historically by decade―covering its history as...

unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy