Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Active Directory Cookbook
Active Directory Cookbook

This book contains hundreds of step-by-step solutions for both common and uncommon problems that you might encounter with Active Directory -- including recipes to deal with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, the Active Directory Schema, and many...

International Economics: Theory and Policy (International Edition)
International Economics: Theory and Policy (International Edition)
At the start of the twenty-first century, international aspects of economics remain as important and controversial as ever. In the last decade alone, major currency and Financial crises have rocked industrializing countries from East Asia to Latin America; countries in Europe have given up their national currencies in favor of a common currency,...
Cyberpolitics in International Relations (MIT Press)
Cyberpolitics in International Relations (MIT Press)

Cyberspace is widely acknowledged as a fundamental fact of daily life in today's world. Until recently, its political impact was thought to be a matter of low politics -- background conditions and routine processes and decisions. Now, however, experts have begun to recognize its effect on high politics -- national security, core...

The Routledge Handbook of Feminist Economics (Routledge International Handbooks)
The Routledge Handbook of Feminist Economics (Routledge International Handbooks)
We are delighted to have finalized the Handbook of Feminist Economics project we began in summer 2018. We set off with the goal of taking stock of the accumulated wisdom on feminist economics from the social provisioning perspective to feminist economics, delineated by Marilyn Power in 2004. Power’s short piece inductively...
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the...

Pro Python
Pro Python

You’ve learned the basics of Python, but how do you take your skills to the next stage? Even if you know enough to be productive, there are a number of features that can take you to the next level in Python. Pro Python, Second Edition explores concepts and features normally left to experimentation, allowing you to be even more...

Social, Ethical and Policy Implications of Information Technology
Social, Ethical and Policy Implications of Information Technology

Legal and ethical issues have become a standard part of engineering and business schools’ curricula. This has not been the case for computer science or management information systems programs although there has been increased emphasis on the social skills of these students. This leaves a frightening void in the student’s professional...

Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however,...
Illiberal Liberal States
Illiberal Liberal States

Understanding the dynamics of the illiberal practices of liberal states is increasingly important in Europe today. This book examines the changing relationship and interaction between immigration, citizenship and integration at the European and national arenas. It studies some of the main effects and open questions as regards the...

The Transparency Edge: How Credibility Can Make or Break You in Business
The Transparency Edge: How Credibility Can Make or Break You in Business

In The Transparency Edge, leadership expert Barbara Pagano demonstrates that a clear and open business policy is a powerful management tool. Backed by exclusive research of thousands of executives at Fortune 500 companies, this comprehensive guide to what-you-see-is-what-you-get leadership shows you how to practice a transparent...

Maritime Security: International Law and Policy Perspectives from Australia and New Zealand
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand

Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to...

Terrorism and Public Safety Policing: Implications for the Obama Presidency
Terrorism and Public Safety Policing: Implications for the Obama Presidency

A Pragmatic Answer to the Systematic Change Already Underway

The trends, data, and battle-tested logic do not lie. A perfect storm of extremist ideologies is on the horizon that threatens to challenge the current state of public safety—forcing police chiefs, public administrators, and security...

unlimited object storage image
Result Page: 83 82 81 80 79 78 77 76 75 74 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy