Home | Amazing | Today | Tags | Publishers | Years | Search 
Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

Digital Asset Management: Content Architectures, Project Management, and Creating Order out of Media Chaos
Digital Asset Management: Content Architectures, Project Management, and Creating Order out of Media Chaos

Digital Asset Management: Content Architectures, Project Management, and Creating Order out of Media Chaos is for those who are planning a digital asset management system or interested in becoming digital asset managers. This book explains both the purpose of digital asset management systems and why an organization...

Cold-adapted Yeasts: Biodiversity, Adaptation Strategies and Biotechnological Significance
Cold-adapted Yeasts: Biodiversity, Adaptation Strategies and Biotechnological Significance

Yeasts are a versatile group of eukaryotic microorganisms, exhibiting heterogeneous nutritional profiles and an extraordinary ability to survive in a wide range of natural and man-associated ecosystems, including cold habitats. Cold-adapted yeasts inhabit numerous low-temperature environments where they are subjected to seasonal or permanent...

Wetlands and Water Framework Directive: Protection, Management and Climate Change (GeoPlanet: Earth and Planetary Sciences)
Wetlands and Water Framework Directive: Protection, Management and Climate Change (GeoPlanet: Earth and Planetary Sciences)

This book compares the lessons learned from a wetland-perspective approach to the changing climate and the requirements of the Water Framework Directive (WFD) with regard to environmental conservation. Examples from Germany and Poland are discussed due to the efficiency of their respective implementations of water conservation policies....

Mastering Sublime Text
Mastering Sublime Text

When it comes to cross-platform text and source code editing, Sublime Text has few rivals. This book will teach you all its great features and help you develop and publish plugins. A brilliantly inclusive guide.

Overview

  • Discover efficient, keyboard-driven text editing
  • Recognize the latest...
Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
The Neutrophils: New Outlook for Old Cells (3rd Edition)
The Neutrophils: New Outlook for Old Cells (3rd Edition)

This is a third edition of the popular book, which presents an overview of the most recent findings in the biology of neutrophils. These cells are critically important for protection against bacterial and viral infections and have been recently demonstrated to be a major contributor to tumor associated immune suppression. In addition,...

Managing Virtual Infrastructure with Veeam® ONE(TM)
Managing Virtual Infrastructure with Veeam® ONE(TM)

Discover ways to manage your virtual infrastructure with Veeam® ONE™ in a development environment

About This Book

  • Implement Veeam® ONE™ for 24/7, real-time monitoring and notifications
  • Virtualize your datacenter/server estate and effectively manage your...
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)

Vast amounts of data are nowadays collected, stored and processed, in an effort to assist in  making a variety of administrative and governmental decisions. These innovative steps considerably improve the speed, effectiveness and quality of decisions. Analyses are increasingly performed by data mining and profiling technologies that...

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human...

Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)
Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)

Since the pioneering work of Joseph Schumpeter (1942), it has been assumed that innovations typically play a key role in firms’ competitiveness.  This assumption has been applied to firms in both developed and developing countries. However, the innovative capacities and business environments of firms in developing countries are...

Soil: The Skin of the Planet Earth
Soil: The Skin of the Planet Earth

The main focus of this monograph is to explain the important role of soil and the environment to a broad audience. Soil is one of the five essential factors crucial for human life. On the one hand the authors describe a responsible approach and use of soil, established on a basic knowledge of the nature of soil and the countless ongoing...

Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy