Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Emerging States and Economies: Their Origins, Drivers, and Challenges Ahead (Emerging-Economy State and International Policy Studies)
Emerging States and Economies: Their Origins, Drivers, and Challenges Ahead (Emerging-Economy State and International Policy Studies)

This open access book asks why and how some of the developing countries have “emerged” under a set of similar global conditions, what led individual countries to choose the particular paths that led to their “emergence,” and what challenges confront them. If we are to...

The Art of R Programming: A Tour of Statistical Software Design
The Art of R Programming: A Tour of Statistical Software Design

R is the world's most popular language for developing statistical software: Archaeologists use it to track the spread of ancient civilizations, drug companies use it to discover which medications are safe and effective, and actuaries use it to assess financial risks and keep economies running smoothly.

...

Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

Mutual Funds: Your Money, Your Choice ... Take Control Now and Build Wealth Wisely
Mutual Funds: Your Money, Your Choice ... Take Control Now and Build Wealth Wisely
Mutual Funds: Your Money, Your Choice gives you an unvarnished look at both the positives and the negatives of mutual fund investing: the real risks, the real costs, the real tax issues, and the real returns. Simply and clearly, without complicated charts or equations, top investment researcher Charles P. Jones...
NTP Security: A Quick-Start Guide
NTP Security: A Quick-Start Guide

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline.

NTP Security: A Quick-Start...

Capital Investment & Financing: a practical guide to financial evaluation
Capital Investment & Financing: a practical guide to financial evaluation

The requirement to maximise value for shareholders is at the core of any corporate investment or financing decision. The intrinsic value of proposed investments should be assessed before deciding how much capital to allocate; the benefits and risks associated with each available source of finance should be considered when capital is being...

The Sustainable Enterprise Fieldbook: Building New Bridges, Second Edition
The Sustainable Enterprise Fieldbook: Building New Bridges, Second Edition

With deep thought and inspiring examples, this updated book engages readers by increasing their understanding and awareness of what sustainability means conceptually, practically, personally, and professionally. It provides readers with the tools and techniques to improve the social, environmental, and economic performance of their...

Integrating Security and Software Engineering: Advances and Future Vision
Integrating Security and Software Engineering: Advances and Future Vision
Protecting valuable assets from intentional harm has been a focus of human activity from time immemorial. The proliferation of computers in society has meant that many business and mission critical assets are increasingly stored and manipulated by computer-based systems. The scale of misuse of these assets has also increased, because of their...
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

South Korea’s 70-Year Endeavor for Foreign Policy, National Defense, and Unification
South Korea’s 70-Year Endeavor for Foreign Policy, National Defense, and Unification
This book brings Korea's finest foreign policy minds together in contemplating the risks and rewards of finally ending the 70 year stalemate between North and South Korea through reunification. While North Korea is in conflict with the United States over denuclearization and regime security, the South Korean government is focusing on...
Wireshark Essentials
Wireshark Essentials

Get up and running with Wireshark to analyze network packets and protocols effectively

About This Book

  • Troubleshoot problems, identify security risks, and measure key application performance metrics with Wireshark
  • Gain valuable insights into the network and application protocols, and the...
I. M. Wright's "Hard Code": A Decade of Hard-Won Lessons from Microsoft (Best Practices)
I. M. Wright's "Hard Code": A Decade of Hard-Won Lessons from Microsoft (Best Practices)

Get the brutal truth about coding, testing, and project management—from a Microsoft insider who tells it like it is. I. M. Wright's deliberately provocative column "Hard Code" has been sparking debate amongst thousands of engineers at Microsoft for years. And now (despite our better instincts), we're making...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy