Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Uncertainty in the Electric Power Industry: Methods and Models for Decision Support
Uncertainty in the Electric Power Industry: Methods and Models for Decision Support
Starting in Chile, the UK and Norway, liberalization and privatization
have been a major theme in the electricity industry during the last decade.

Through the introduction of competition and economic considerations,
governments around the world have attempted to obtain more reliable and
cheaper services for the electricity
...
Securing SCADA Systems
Securing SCADA Systems
How to secure systems that weren't built for security

Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security...

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Cloud Application Architectures: Building Applications and Infrastructure in the Cloud
Cloud Application Architectures: Building Applications and Infrastructure in the Cloud

If you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, highly redundant infrastructure services.


While analysts hotly debate the advantages and risks of cloud
...
Agriculture 5.0: Artificial Intelligence, IoT and Machine Learning
Agriculture 5.0: Artificial Intelligence, IoT and Machine Learning

Agriculture 5.0: Artificial Intelligence, IoT & Machine Learning provides an interdisciplinary, integrative overview of latest development in the domain of smart farming. It shows how the traditional farming practices are being enhanced and modified by automation and introduction of modern scalable technological...

Software Requirements: Styles & Techniques
Software Requirements: Styles & Techniques
Most IT systems fail to meet expectations. They don't meet business goals and don't support users efficiently. Why? Because the requirements didn't address the right issues. Writing a good requirements specification doesn't take more time. This book shows how it¿s done - many times faster and many times smarter.  What are the...
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Calculated Risks: How to Know When Numbers Deceive You
Calculated Risks: How to Know When Numbers Deceive You
At the beginning of the twentieth century, H. G. Wells predicted that statistical thinking would be as necessary for citizenship in a technological world as the ability to read and write. But in the twenty-first century, we are often overwhelmed by a baffling array of percentages and probabilities as we try to navigate in a world dominated...
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Common-Sense C: Advice and Warnings for C and C++ Programmers
Common-Sense C: Advice and Warnings for C and C++ Programmers
C is a powerful programming language, but not without risks. Without help, even experienced C programmers can find themselves in trouble, despite "careful" programming, lint filters and good debuggers. And managers of programming projects can discover too late that using C carelessly can lead to delayed and defect-ridden software. This...
Absolute Beginner's Guide to Project Management (2nd Edition)
Absolute Beginner's Guide to Project Management (2nd Edition)

Why learn project management the hard way?

 

Absolute Beginner’s Guide to Project Management, Second Edition will have you managing projects in no time! Here’s a small sample of what you’ll learn: 

RFID Field Guide : Deploying Radio Frequency Identification Systems
RFID Field Guide : Deploying Radio Frequency Identification Systems

Whatever your industry or application, RFID Field Guide is your comprehensive guide to planning, designing, and deploying RFID technologies. Two leading RFID consultants draw on their extensive experience to cut through the hype associated with RFID technology...

unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy