Home | Amazing | Today | Tags | Publishers | Years | Search 
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Practical Azure Application Development: A Step-by-Step Approach to Build Feature-Rich Cloud-Ready Solutions
Practical Azure Application Development: A Step-by-Step Approach to Build Feature-Rich Cloud-Ready Solutions
Get started and learn a step-by-step approach to application development using Microsoft Azure. Select the right services to solve the problem at hand in a cost-effective manner and explore the potential different services and how they can help in building enterprise applications.

Azure has an ample amount of
...
Smart Packaging Technologies for Fast Moving Consumer Goods
Smart Packaging Technologies for Fast Moving Consumer Goods

Smart Packaging Technologies for Fast Moving Consumer Goods approaches the subject of smart packaging from an innovative, thematic perspective:

  • Part 1 looks at smart packaging technologies for food quality and safety
  • Part 2 addresses smart packaging issues for the supply chain
  • ...
Bioactive Natural Products: Detection, Isolation, and Structural Determination, Second Edition
Bioactive Natural Products: Detection, Isolation, and Structural Determination, Second Edition

Bioactive natural products are proving to be a rich source of novel therapeutics to both protect against and combat diseases, as well as serve as lead compounds in crop protection. Following the successful format of the first edition, this volume brings together collective research from many new contributors and emphasizes the rationale...

Treatments from Toxins: The Therapeutic Potential of Clostridial Neurotoxins
Treatments from Toxins: The Therapeutic Potential of Clostridial Neurotoxins

As little as two decades ago, deliberately injecting botulinum toxin into patients would have seemed foolhardy at best and criminal at worst. The increased clinical use of botulinum toxins has expanded the body of knowledge available on the structure and function of these proteins. This knowledge can be applied to topics as varied as...

Lactoferrin:  Natural - Multifunctional - Antimicrobial
Lactoferrin: Natural - Multifunctional - Antimicrobial

Illnesses resulting from foodborne pathogens occur at least 6 million times each year and cause an estimated 9,000 deaths. For decades, food microbiologists have developed various effective methods of food protection. However, the constant development of multi-facet food processing technologies and the emergence of potent foodborne pathogens,...

Prehospital Trauma Care
Prehospital Trauma Care

Comprehensive in scope and content, Prehospital Trauma Care (PTC) covers all aspects of emergency medicine-triage assessment and treatment, anesthesia, intensive care, psychiatry, health and military disasters, burns, shock, and surgery.
Written by over 70 distinguished international experts representing Australia, Austria, Belgium,
...

Citrix Access Gateway VPX 5.04 Essentials
Citrix Access Gateway VPX 5.04 Essentials

A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX

Overview

  • A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
  • Establish secure access...
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In
...

Introducing Windows Server 2012 R2
Introducing Windows Server 2012 R2

NOTE: This title is also available as a free eBook on the Microsoft Download Center. It is offered for sale in print format as a convenience.

Get a head start evaluating Windows Server 2012 R2 - with technical insights from a Microsoft MVP and members of the Windows Server product team. Based on final Windows Server 2012 R2...

MCITP Self-Paced Training Kit (Exams 70-640, 70-642, 70-646): Windows Server® 2008 Server Administrator Core Requirements: Exams 70-640/642/646 (Microsoft Press Training Kit)
MCITP Self-Paced Training Kit (Exams 70-640, 70-642, 70-646): Windows Server® 2008 Server Administrator Core Requirements: Exams 70-640/642/646 (Microsoft Press Training Kit)

Get in-depth training and practice with the skills measured by the core exams for Microsoft Certified IT Professional (MCITP): Windows Server 2008 Server Administrator certification—all in one box! Covering exams 70-640, 70-642, and 70-646, these three training kits include exam prep and practice tests to help you maximize your...

Windows Server 2008 R2 Secrets
Windows Server 2008 R2 Secrets

Unbeatable advice and expert tips for administering, upgrading or migrating to Windows Server 2008 R2

If you're a Windows Server 2008 system administrator, this is a reference you?ll want to keep on hand. Written by a Microsoft MVP who has multiple MCITP certifications and bestselling author, this book gives you...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy