Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Forefront Identity Manager 2010 R2 Handbook
Microsoft Forefront Identity Manager 2010 R2 Handbook
Microsoft's Forefront Identity Manager simplifies enterprise Identity Management for end users by automating admin tasks and integrating the infrastructure of an enterprise with strong authentication systems.

The Microsoft Forefront Identity Manager 2010 R2 Handbook is an in-depth guide to Identity Management.
...
User Modeling, Adaptation and Personalization: 19th International Conference, UMAP 2011, Girona, Spain
User Modeling, Adaptation and Personalization: 19th International Conference, UMAP 2011, Girona, Spain
The 19th International Conference on User Modeling, Adaptation and Personalization (UMAP 2011) took place in Girona, Spain, during July 11–15, 2011. It was the third annual conference under the UMAP title, which resulted from the merger in 2009 of the successful biannual User Modeling (UM) and Adaptive Hypermedia (AH)...
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Sonar Code Quality Testing Essentials
Sonar Code Quality Testing Essentials
Developers continuously strive to achieve higher levels of source code quality. It is the holy grail in the software development industry. Sonar is an all-out platform confronting quality from numerous aspects as it covers quality on seven axes, provides an abundance of hunting tools to pinpoint code defects, and continuously...
Moodle Gradebook
Moodle Gradebook
Moodle is used in many areas of education to provide a range of resources and activities to support learning. However, it can also be used to manage learning and record progress.

This book will explain the uses of the Moodle grades area, also known as the Gradebook, to record grades for work completed and to
...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Chemistry of Pyrotechnics: Basic Principles and Theory
Chemistry of Pyrotechnics: Basic Principles and Theory
Everyone has observed chemical reactions involving pyrotechnic mixtures. Beautiful 4th of July fireworks, highway distress signals, solid fuel boosters for the Space Shuttle, and the black powder used by muzzle-loading rifle enthusiasts all have a common technical background.

The chemical principles underlying
...
Natural and Wood Fibre Reinforcement in Polymers (Rapra Review Reports)
Natural and Wood Fibre Reinforcement in Polymers (Rapra Review Reports)
The use of composite materials dates from centuries ago, when it all started with natural fibres. In ancient Egypt some 3,000 years ago, clay was reinforced by straw to build walls. Later on the natural fibre lost much of its interest.

This report examines the different fibre types available and the current research. The...

web2py Application Development Cookbook
web2py Application Development Cookbook
we2py is a framework for rapid development of secure database-driven Internet applications. It is written in and is programmable in Python. It comprises libraries, applications, and reusable examples.

Created in 2007,web2py has grown, evolved, and improved tremendously, thanks to the work of many developers who have
...
Prospective Evaluation of Applied Energy Research and Development at DOE (Phase Two)
Prospective Evaluation of Applied Energy Research and Development at DOE (Phase Two)
In recent years, federal oversight of public expenditures has sought to integrate performance and budgeting. Notably, the Government Performance and Results Act (GPRA) was passed in 1993 “in response to questions about the value and effectiveness of federal programs” (GAO, 1997, p. 11). GPRA and other mandates...
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Within the last 15 years in the field of “sputtering by particle bombardment” several new and important results have been published in internal reports, in PhD thesis, as well as in the open literature. This relates especially to a more detailed understanding of the sputtering process by computational means such as...
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy