Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Research on Teaching Literacy Through the Communicative and Visual Arts
Handbook of Research on Teaching Literacy Through the Communicative and Visual Arts
The Handbook of Research on Teaching Literacy Through the Communicative and Visual Arts, a comprehensive overview of research on this topic, extends conceptualizations of literacy to include all of the communicative arts (reading, writing, speaking, listening, viewing) and the visual arts of drama, dance, film, art, video, and computer...
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments

Save time & resources with this comprehensive guide to automation configuration for the value-added IP services of the future.

As the Internet becomes the medium of choice for value-added IP service offerings such as TV broadcasting, videoconferencing, and Voice over IP, the ability of automating configuration...

Windows Vista: The Definitive Guide
Windows Vista: The Definitive Guide
Whether you're a beginner, power user, or seasoned professional, Windows Vista: The Definitive Guide has everything you need to customize the operating system, master your digital media, manage your data, and maintain your computer -- regardless of which Windows Vista edition you're using.

Why this book and not some other resource?...

The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)
The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)

The digital revolution is in full force but many public and private sector leaders are stymied: How can they maximize the full potential of digital technology? This hesitancy puts a brake on the transformational power of digital technology and means private companies and governmental bodies fall well behind other digital pioneers....

Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”  

John McAuley,EMC Corporation

"This book details innovative technology...

Europe in Crisis: Bolt from the Blue?
Europe in Crisis: Bolt from the Blue?

This book analyzes the European Great Recession of 2008-12, its economic and social causes, its historical roots, and the policies adopted by the European Union to find a way out of it. It contains explicit debates with several economists and analysts on some of the most controversial questions about the causes of the crisis and the policies...

Environmental Chemistry and Toxicology of Mercury
Environmental Chemistry and Toxicology of Mercury

The book that looks at mercury's impact on the planet today

Recent research by the EPA has concluded that one in six women of childbearing age have unsafe levels of mercury in their bodies, which puts 630,000 newborn babies each year at risk of neurological impairment. Mercury poses severe risks to the health of animals and...

Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
Promoting Sustainable Electricity in Europe: Challenging the Path Dependence of Dominant Energy Systems
Promoting Sustainable Electricity in Europe: Challenging the Path Dependence of Dominant Energy Systems
This is a timely and comparative assessment of initiatives to promote renewable electricity sources (RES) in eight European countries. Carried out by the ProSus research programme at the University of Oslo in cooperation with leading research institutions in each country, the study focuses on the promotional schemes used to foster RES in Austria,...
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Microeconomics (7th Edition)
Microeconomics (7th Edition)

KEY BENEFIT: This book is well known for its coverage of modern topics (Game theory, Economics of Information, and Behavioral Economics), clarity of its writing style and graphs, and integrated use of real world examples.

KEY TOPICS: The emphasis on relevance and application to...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

unlimited object storage image
Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy