Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
War and Childhood in the Era of the Two World Wars (Publications of the German Historical Institute)
War and Childhood in the Era of the Two World Wars (Publications of the German Historical Institute)
The histories of modern war and childhood were the result of competing urgencies. According to ideals of childhood widely accepted throughout the world by 1900, children should have been protected, even hidden, from conflict and danger. Yet at a time when modern ways of childhood became increasingly possible for economic, social, and political...
Information Security Policies and Actions in Modern Integrated Systems
Information Security Policies and Actions in Modern Integrated Systems
Information Security Policies and Actions in Modern Integrated Systems is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data,...
Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
TcL Scripting for Cisco IOS (Networking Technology)
TcL Scripting for Cisco IOS (Networking Technology)

A guide to building and modifying Tcl scripts to automate network administration tasks

 

Streamline Cisco network administration and save time with Tcl scripting

Cisco networking professionals are under relentless pressure to...

Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

The Economic and Social Impacts of E-Commerce
The Economic and Social Impacts of E-Commerce
E-commerce is not new, though the interest shown in it is of relatively recent origin. Academics have applied their skill in seeking to maintain or improve business efficiency for years past, but they have concerned themselves mainly with obtaining facts of a historical nature – that is, by analyzing past papers, they have  sought to...
Communications Policy and Information Technology: Promises, Problems, Prospects (Telecommunications Policy Research Conference)
Communications Policy and Information Technology: Promises, Problems, Prospects (Telecommunications Policy Research Conference)
New technologies, although developed with optimism, often fall short of their predicted potential and create new problems. Communications technologies are no different. Their utopian proponents claim that universal access to advanced communications technologies can help to feed the hungry, cure the sick, educate the illiterate, improve the global...
Under Control: Governance Across the Enterprise
Under Control: Governance Across the Enterprise

With the economic crisis that began in 2008, a long-standing trend toward increased regulation is becoming a flood. The clamor for improved enterprise risk management and the complexity of multinational compliance present executives with a dramatically new array of challenges.

Governance should offer solutions, but it is clear that...

A Living Countryside? (Perspectives on Rural Policy and Planning)
A Living Countryside? (Perspectives on Rural Policy and Planning)

In recent years the ideal of achieving sustainable rural development has become a key dimension of EU, national, regional and local policy. Whether this ideal is achievable in the near future to any substantial degree is by no means certain. By examining a range of experiences from both the north and south of Ireland, this book asks what the...

Debating the Reagan Presidency (Debating Twentieth-Century America)
Debating the Reagan Presidency (Debating Twentieth-Century America)

The presidency of Ronald Reagan has become a Rorschach Test for politicians and citizens alike. Conservatives see the Reagan era as the high-water mark for their movement, in much the same way that many progressives view FDR's presidency as the pinnacle of liberalism. Liberals maintain that the rosy Reagan legacy is based largely on myth, and...

Microsoft SQL Server 2008 High Availability
Microsoft SQL Server 2008 High Availability

Every new version of SQL Server brings with it new tools and features for database administrators (DBAs), developers, and architects, for them to be able to provide an effective solution for the end users in a simpler and more efficient manner. The terms effective and efficiency can be measured in a technical perspective as High Availability...

Road User Charging and Electronic Toll Collection
Road User Charging and Electronic Toll Collection

As highways, crossing points, and urban streets become increasingly jammed with traffic, more and more roadway authorities are turning to electronic tolling and pricing to manage traffic and road usage. This authoritative book offers professionals expert guidance in planning, procuring, and operating electronic tolling and road-user charging...

unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy