Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks
alo Alto Networks, Inc. (NYSE: PANW) is an international cybersecurity organization located in Santa Clara, California. Its essential products include an integrated firewall framework and cloud-based offerings that expand sure firewalls to cover other protection issues. About 70,000 businesses in 150 countries utilize the...
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Treo Essentials (Que Paperback)
Treo Essentials (Que Paperback)
Make your Treo smartphone live up to its name. Treo Essentials will show you how to get the most out of your Treo 600 or 650 smartphone without making you feel anything but smart. You already know the basics and this book will take you beyond them. You'll learn how to synchronize with a PC, launch applications while...
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...

The Implementation (TCP/IP Illustrated, Volume 2)
The Implementation (TCP/IP Illustrated, Volume 2)

TCP/IP Illustrated, an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite.

TCP/IP Illustrated, Volume 2 contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis...

Handbook of Cosmetic Science and Technology, Second Edition
Handbook of Cosmetic Science and Technology, Second Edition
Although cosmetics for the purpose of beautifying, perfuming, cleansing, or for rituals have existed since the origin of civilization, only in the 20th century great progress has been made in the diversification of products and functions and in the safety and protection of the consumer.

Before 1938, cosmetics were
...
DC Power System Design for Telecommunications (IEEE Telecommunications Handbook Series)
DC Power System Design for Telecommunications (IEEE Telecommunications Handbook Series)

Straightforward, systematic approach for designing reliable dc power systems for telecommunications

Here is a must-have resource for anyone responsible for designing, installing, and maintaining telecommunications systems. The text explains how to design direct current (dc) power systems that operate at nominal voltages of 24
...

The Aftershock Investor: A Crash Course in Staying Afloat in a Sinking Economy
The Aftershock Investor: A Crash Course in Staying Afloat in a Sinking Economy

Advice on protection and profits in the short and long term future from the experts who accurately predicted the financial crisis of 2008, and who now have more detailed information about what is yet to come

From the authors who accurately predicted the domino fall of the conjoined real estate, stock, and private debt...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Innovation in Life Cycle Engineering and Sustainable Development
Innovation in Life Cycle Engineering and Sustainable Development
The focus of this book is the consideration of environmental issues in engineering process and product design. It presents a selection of 30 papers ensuing from the 12th CIRP International seminar on Life Cycle Engineering, held at the university of Grenoble, France, in April 2005.

Sustainable development is more and more at the core of...

Corrosion Behaviour and Protection of Copper and Aluminum Alloys in Seawater (EFC 50)
Corrosion Behaviour and Protection of Copper and Aluminum Alloys in Seawater (EFC 50)
The Marine Corrosion Working Party of the EFC (EFC WP9) organised an international workshop on the behaviour of copper and aluminium alloys in natural and treated seawaters during EUROCORR 2004 in Nice (France). One of the major objectives of this ‘Marine Corrosion Workshop on Copper and Aluminium Alloys in...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy