Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Temporary Appropriation in Cities: Human Spatialisation in Public Spaces and Community Resilience
Temporary Appropriation in Cities: Human Spatialisation in Public Spaces and Community Resilience

This book conceptualises and illustrates temporary appropriation as an urban phenomenon, exploring its contributions to citizenship, urban social sustainability and urban health. It explains how some forms of appropriation can be subversive, existing in a grey area between legal and illegal activities in the city.

The...

Microsoft Exchange Server 2013 High Availability
Microsoft Exchange Server 2013 High Availability

Design a highly available Exchange 2013 messaging environment using real-world examples

Overview

  • Use the easy-to-follow guidelines and tips to achieve the highest availability
  • Covers all the aspects that need to be considered before, during and after implementation of high availability
  • ...
MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 (with a formal ISO/IEC designation ISO/IEC 14496) standardization was initiated in 1994 to address the requirements of the rapidly converging telecommunication, computer, and TV/film industries. MPEG-4 had a mandate to standardize algorithms for audiovisual coding in multimedia applications, digital television, interactive graphics, and...
Learning from Catastrophes: Strategies for Reaction and Response
Learning from Catastrophes: Strategies for Reaction and Response

Breakthrough Best Practices for Managing Extreme Risks–Both Natural and Man-Made

  • How to prepare for risks ranging from financial crises and climate change to pandemics and terrorism
  • Indispensable...
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Critical Information Infrastructures: Resilience and Protection
Critical Information Infrastructures: Resilience and Protection
A very interesting and informative book that covers a wide but interlinked set of subjects. Indeed, attention has been paid to assisting the reader to understand complex and current issues, and it can be said that the work is extremely well researched, up-to-date and of interest to a wide audience including practising managers, government...
Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
This book concentrates on three main challenges of video coding for mobile communications: higher coding efficiency, reduced computational complexity, and improved error resilience. Unlike other high level books and articles that focus on individual aspects in this field, this book has been designed as a quick, easy, and practical introduction to...
Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)
Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)

Book + Content Update Program

“Beyond just describing the basics, this book dives into best practices every aspiring microservices developer or architect should know.”
—Foreword by Corey Sanders, Partner Director of Program Management, Azure

Microservice-based
...

Wireless Mobility: The Why of Wireless (Networking Professional's Library)
Wireless Mobility: The Why of Wireless (Networking Professional's Library)

Comprehensive Answers to the "Why" of Wireless Mobility

In this unique guide, Cisco wireless expert Neil Reid incorporates best practices from some of the most complex and challenging wireless deployments in the industry and provides an insider's view of the "why" of wireless mobility. The book discusses...

Suffering Insanity: Psychoanalytic Essays on Psychosis
Suffering Insanity: Psychoanalytic Essays on Psychosis
This book raises very important issues for further reflection by all those working in the field of psychosis. Under supervision, the essays act as excellent, stimulating texts for use in teaching situations. The book is warmly recommended to the readership of this journal. -
Richard Lucas, British Journal of
...
Acquired Brain Injury: An Integrative Neuro-Rehabilitation Approach
Acquired Brain Injury: An Integrative Neuro-Rehabilitation Approach
Crimmins (2000) marveled at the greatness of the “three pound-blob” that is our brain and control system. As seasoned clinicians in the field of neuro-rehabilitation, we still marvel each day at the resilience of the brain and at the exciting recoveries that we attempt to facilitate in survivors of acquired brain...
unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy