Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Load Balancing: Ride the Performance Tiger
Practical Load Balancing: Ride the Performance Tiger
The Internet, and in particular the World Wide Web, have effectively leveled the playing field for businesses and individuals around the world. Do you have a great idea for a web site or a service? Even the more advanced ideas can be relatively easily and cheaply realized without much in the way of initial outlay. You can get...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Big Think Strategy: How to Leverage Bold Ideas and Leave Small Thinking Behind
Big Think Strategy: How to Leverage Bold Ideas and Leave Small Thinking Behind

Business leaders need bold strategies to stay relevant and win. In "Big Think Strategy", Schmitt shows how to bring bold thinking into your business by sourcing big ideas and executing them creatively. With the tools in this book, any leader can overcome institutionalized 'small think' - the inertia, the narrow-mindedness,...

Municipal Solid Waste Incinerator Residues (Studies in Environmental Science)
Municipal Solid Waste Incinerator Residues (Studies in Environmental Science)
The International Ash Working Group (IAWG) was established in 1989 to conduct an in-depth review of the existing scientific data and develop a state-of-knowledge treatise on MSW incinerator residue characterisation, disposal, treatment and utilisation. The topics of operator and worker health and safety, and health risk assessment...
J2EE Platform Web Services
J2EE Platform Web Services

Build robust, scalable, end-to-end business solutions with J2EE(TM) Web Services.

This is the definitive practitioner's guide to building enterprise-class J2EE Web Services that integrate with any B2B application and interoperate with any legacy system. Sun senior architect Ray Lai introduces 25...

Service-Oriented Architecture : A Field Guide to Integrating XML and Web Services
Service-Oriented Architecture : A Field Guide to Integrating XML and Web Services
Service-oriented integration with less cost and less risk

  

The emergence of key second-generation Web services standards has positioned service-oriented architecture (SOA) as the foremost platform for contemporary business automation solutions. The integration of SOA...

Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Business and Competitive Analysis: Effective Application of New and Classic Methods
Business and Competitive Analysis: Effective Application of New and Classic Methods

“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.”
--Bill Fiora, Partner and Founder, Outward Insights

  

Lean Analytics: Use Data to Build a Better Startup Faster (Lean Series)
Lean Analytics: Use Data to Build a Better Startup Faster (Lean Series)

Marc Andreesen once said that "markets that don't exist don't care how smart you are." Whether you're a startup founder trying to disrupt an industry, or an intrapreneur trying to provoke change from within, your biggest risk is building something nobody wants.

Lean Analytics can help. By measuring and
...

Environmental Nanotechnology Volume 3 (Environmental Chemistry for a Sustainable World)
Environmental Nanotechnology Volume 3 (Environmental Chemistry for a Sustainable World)

This third volume on environmental nanotechnology includes chapters dealing with topics such nanoremediation, waste water purification, nanosensors, nanomedicine, and nanofiltration. It also highlights the safety aspects and risk assessment and management related to several toxins, as well as nanotechnology related solutions for...

unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy