Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Restoration and Development of the Degraded Loess Plateau, China (Ecological Research Monographs)
Restoration and Development of the Degraded Loess Plateau, China (Ecological Research Monographs)

This book presents state-of-the-art scientific evidence and technological innovations to restore lands on the Loess Plateau of China, known worldwide for its serious land degradation and desertification problems. Supported by a rapidly developing Chinese economy and the dissemination of effective technology, the Grain-for-Green Project and...

Crossborder Care: Lessons from Central Europe
Crossborder Care: Lessons from Central Europe

This book analyses the circular migration of care workers in Central Europe using the example of Slovak carers in 24-hour care provision for the elderly in Austria. Challenging analyses that focus primarily on care drain and care regimes, Bahna and Sekulová supplement quantitative methodology with qualitative fieldwork to...

Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

XML in 60 Minutes a Day
XML in 60 Minutes a Day
Get up and running with XML using this innovative virtual classroom approach!

Interested in mastering XML? This revolutionary book and companion online presentation take you through 16 one-hour lessons that quickly get you up to speed on many of XML’s capabilities. With this unique approach and real-world perspective, you’ll be able...

Human Resource Policies and Procedures for Nonprofit Organizations
Human Resource Policies and Procedures for Nonprofit Organizations

Competition for resources, expanding service demands, and calls for accountability are just a few of the issues challenging the more than two million nonprofit organizations in the United States to maximize their effectiveness and efficiency in order to survive.

To help nonprofits create an effective work environment, Human Resource...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Security of Mobile Communications
Security of Mobile Communications

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.

Providing technicians and designers with a...

New Metropolitan Perspectives: Knowledge Dynamics and Innovation-driven Policies Towards Urban and Regional Transition Volume 2 (Smart Innovation, Systems and Technologies, 178)
New Metropolitan Perspectives: Knowledge Dynamics and Innovation-driven Policies Towards Urban and Regional Transition Volume 2 (Smart Innovation, Systems and Technologies, 178)

?This book presents the outcomes of the symposium “NEW METROPOLITAN PERSPECTIVES,” held at Mediterranea University, Reggio Calabria, Italy on May 26–28, 2020.

Addressing the challenge of Knowledge Dynamics and Innovation-driven Policies Towards Urban and Regional Transition,
...
Citrix® XenMobile™ Mobile Device Management
Citrix® XenMobile™ Mobile Device Management

Get up to speed with mobile device management with this fantastic, fully illustrated guide to XenMobile. From security to package deployment, it's an essential companion for the current trend of BYOD and corporate mobile devices.

Overview

  • Deploy and manage the complete XenMobile solution
  • ...
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Overview

  • Learn sample forms and process flows for quick and easy use.
  • An easy-to-follow reference for implementing information security in the enterprise.
  • Learn...
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring...

VMware vSphere 5 Clustering Technical Deepdive
VMware vSphere 5 Clustering Technical Deepdive

** Black & White edition ** VMware vSphere 5 Clustering Technical Deepdive zooms in on three key components of every VMware based infrastructure and is by no means a "how to" guide. It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it...

unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy