Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Microsoft Windows Server 2012 Dynamic Access Control
Learning Microsoft Windows Server 2012 Dynamic Access Control

When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.

Overview

  • Understand the advantages of using Dynamic Access Control and how it...
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)

Vast amounts of data are nowadays collected, stored and processed, in an effort to assist in  making a variety of administrative and governmental decisions. These innovative steps considerably improve the speed, effectiveness and quality of decisions. Analyses are increasingly performed by data mining and profiling technologies that...

Agglomeration in Metallurgy (Topics in Mining, Metallurgy and Materials Engineering)
Agglomeration in Metallurgy (Topics in Mining, Metallurgy and Materials Engineering)
This book gives details on the processes of agglomeration and its role in modern metal production processes. It starts with a chapter on sinter production, also discussing the quality of sinter and environmental aspects involved on the process. The following chapters focus on pellet production and briquetting of natural and anthropogenic raw...
Channel-Adaptive Technologies and Cross-Layer Designs for Wireless Systems with Multiple Antennas: Theory and Applications
Channel-Adaptive Technologies and Cross-Layer Designs for Wireless Systems with Multiple Antennas: Theory and Applications
Wireless communications is one of the most active areas of research over the
past and the current decades. In fact, the demand for wireless services has been
changing from the regular voice telephony services to mixed voice, data, and
multimedia services over the wireless media. Since the mid-1990s, the wireless
industry has
...
Information Quality (Advances in Management Information Systems)
Information Quality (Advances in Management Information Systems)
Like the lament of Coleridge’s ancient mariner who finds himself adrift at sea surrounded by water yet dying of thirst, many organizations find they are surrounded by data, yet much of it does not truly satisfy their information needs. Today we have at our disposal vast stores of information that come in a variety of forms: records,...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Applied SOA: Service-Oriented Architecture and Design Strategies
Applied SOA: Service-Oriented Architecture and Design Strategies
You need more than theory to make SOA work.

You need this practical guide.

The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...

Handbook of Plastic Optics
Handbook of Plastic Optics

This volume is the only book to describe in detail all aspects of plastic optics from design issues to production technology and quality control aspects. Throughout, the focus is firmly set on practical applications, making this an indispensable source of information for all those working in optics research and development.

Topics...

Blender 2.5 Lighting and Rendering
Blender 2.5 Lighting and Rendering

Each chapter develops a different aspect of a Blender technique. The book is essentially a step-by-step tutorial, which builds up your knowledge throughout. It has practical examples such as lighting a tricycle in open space, lighting a wine bottle on a table, and lighting a room that has a lamp as well as sunlight coming in through the...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Algorithms and Computation: 11th International Conference, ISAAC 2000, Taipei, Taiwan
Algorithms and Computation: 11th International Conference, ISAAC 2000, Taipei, Taiwan
The papers in this volume were selected for presentation at the Eleventh Annual International Symposium on Algorithms and Computation (ISAAC 2000), held on 18{20 December, 2000 at the Institute of Information Science, Academia Sinica, Taipei, Taiwan. Previous meetings were held in Tokyo (1990), Taipei (1991), Nagoya (1992),...
Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
unlimited object storage image
Result Page: 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy