Home | Amazing | Today | Tags | Publishers | Years | Search 
JUNOS OS For Dummies (Computer/Tech)
JUNOS OS For Dummies (Computer/Tech)

Welcome to Junos OS For Dummies. This book provides you with a handy reference for configuring and running Junos software on Juniper Networks products. (We won’t bore you with how Junos got here, but you can discover more about Juniper Networks and the evolution of Junos software at www.juniper.net/company.)

...

A Short History of Financial Euphoria (Penguin Business)
A Short History of Financial Euphoria (Penguin Business)
The world-renowned economist offers "dourly irreverent analyses of financial debacle from the tulip craze of the seventeenth century to the recent plague of junk bonds."—The Atlantic.
 
It is now three years since I did the main work on this small book. As I told in the Foreword to...
Endocrine Disrupters in Wastewater and Sludge Treatment Processes
Endocrine Disrupters in Wastewater and Sludge Treatment Processes
Although the hypothesis that environmental chemicals may exhibit endocrine disrupting effects is not new, being raised by Allen and Doisy in 1924, again by Dodds et al. in 1938, and in the 1950s by Burlington and Lindeman, the issue has seen a growing level of concern due to reports of increased incidences of...
OS X Mountain Lion Pocket Guide
OS X Mountain Lion Pocket Guide
OS X was first released to the public over a decade ago as Mac OS X Beta (code-named Kodiak). The decade after that saw Mac OS X go from an interesting oddity unsuited to daily work to a usable operating system with little third-party support to everything most people want out of an operating system and a...
Head First Java Code Magnets
Head First Java Code Magnets
Java takes you to new places. From its humble release to the public as the (wimpy) version 1.02, Java seduced programmers with its friendly syntax, object-oriented features, memory management, and best of all—the promise of portability. We'll take a quick dip and write some code, compile it, and run it. We're talking...
Microsoft System Center 2012 Unleashed
Microsoft System Center 2012 Unleashed

This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and...

The Archaeology of Athens
The Archaeology of Athens
The city of Athens has played a leading role in the development of European civilization. When we look back through time to the origins of so many of the institutions and activities which thrive or are valued today, we are led to ancient Greece and, most often, to Athens in the Classical period (480–323 B.C.). Time and again...
MCTS: Windows Server 2008 R2 Complete Study Guide (Exams 70-640, 70-642 and 70-643)
MCTS: Windows Server 2008 R2 Complete Study Guide (Exams 70-640, 70-642 and 70-643)

The must-have study guide for all three Windows Server 2008 R2 MCTS exams

Network administrators boost their value to their employers with certification, and Microsoft?s three Windows Server 2008 exams offer certification specialties in configuring Active Directory, Network Infrastructure, and Applications Infrastructure....

Android Apps Security
Android Apps Security

Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps.

This book will provide developers with the
...

Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Branding Yourself: How to Use Social Media to Invent or Reinvent Yourself (2nd Edition) (Que Biz-Tech)
Branding Yourself: How to Use Social Media to Invent or Reinvent Yourself (2nd Edition) (Que Biz-Tech)

Want a new job or career? Need to demonstrate more value to customers or employers? Use today’s hottest social media platforms to build the powerful personal brand that gets you what you want! In this completely updated book, Erik Deckers and Kyle Lacy help you use social media to attract new business and job...

Result Page: 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy