Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Asset Protection and Security Management Handbook
Asset Protection and Security Management Handbook
Overall an excellent book, a lot of valuable information…I would give the book 9 out of a possible 10 stars … Well organized and well written, the ideas and concepts flow in a methodical and progressive manner. … for those who have an interest in the subject matter, the book is a pleasure to read. …Excellent and...
Radiation Protection in Nuclear Medicine
Radiation Protection in Nuclear Medicine

This book explains clearly and in detail all aspects of radiation protection in nuclear medicine, including measurement quantities and units, detectors and dosimeters, and radiation biology. Discussion of radiation doses to patients and to embryos, fetuses, and children forms a central part of the book. Phantom models, biokinetic models,...

Disaster Recovery using VMware vSphere Replication and vCenter Site Recovery Manager
Disaster Recovery using VMware vSphere Replication and vCenter Site Recovery Manager

Learn to deploy and use vSphere Replication 5.5 as a standalone disaster recovery solution and to orchestrate disaster recovery using vCenter Site Recovery Manager 5.5

About This Book

  • Learn how to deploy and use vSphere Replication as a standalone disaster recovery solution.
  • Configure SRM...
Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

Real Options Analysis Course : Business Cases and Software Applications
Real Options Analysis Course : Business Cases and Software Applications
Praise for Real Options Analysis Course

"Dr. Mun’s latest book is a logical extension of the theory and application presented in Real Options Analysis. More specifically, the Real Options Analysis Course presents numerous real options examples and provides the reader with step-by-step problem-solving techniques. After having read the...

Sarbanes-Oxley IT Compliance Using Open Source Tools-Second Edition, Second Edition
Sarbanes-Oxley IT Compliance Using Open Source Tools-Second Edition, Second Edition
The Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal securities laws in the United States since the New Deal. It came in the wake of a series of corporate financial scandals,...
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
PLAN, INSTALL, CONFIGURE, SECURE, OPTIMIZE AND TROUBLESHOOT! Citrix MetaFrame is the de facto standard for hosting and delivering applications from Windows-based servers. Citrix MetaFrame Presentation Server 3.0 is optimized for performance under Windows Server 2003, particularly Terminal Services. This book covers all the topics...
Passive Optical Networks: Principles and Practice
Passive Optical Networks: Principles and Practice
The advent of video-on-demand and interactive gaming has prompted the deployment of broadband infrastructures. Because of its large bandwidth, Passive Optical Networks (PONs) are seen as the technology to make this happen. However, there are numerous standards and technologies - EPON, BPON, GPON, APON, WDM-PON, TDM-PON - which network providers and...
Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

PC Magazine Fighting Spyware, Viruses, and Malware
PC Magazine Fighting Spyware, Viruses, and Malware
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...

Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You’ll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful services....
unlimited object storage image
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy