Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)

This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems...

DevOps with Kubernetes: Accelerating software delivery with container orchestrators
DevOps with Kubernetes: Accelerating software delivery with container orchestrators

Learn to implement DevOps using Docker & Kubernetes.

About This Book

  • Learning DevOps, container, and Kubernetes within one book.
  • Leverage Kubernetes as a platform to deploy, scale, and run containers efficiently.
  • A practical guide towards container management and...
Web as History: Using Web Archives to Understand the Past and the Present
Web as History: Using Web Archives to Understand the Past and the Present
The World Wide Web has now been in use for more than 20 years. From early browsers to today’s principal source of information, entertainment and much else, the Web is an integral part of our daily lives, to the extent that some people believe ‘if it’s not online, it doesn’t exist.’ While this statement is not...
Sustainable Peacebuilding and Social Justice in Times of Transition: Findings on the Role of Education in Myanmar
Sustainable Peacebuilding and Social Justice in Times of Transition: Findings on the Role of Education in Myanmar

This book offers a unique insight into the ways in which education systems, governance, and actors at multiple scales interact in initial steps towards building peace. It presents a spectrum of recently conducted research in the context of Myanmar, a society in the midst of challenging transitions, politically, socio-culturally and...

Clothes and Monasticism in Ancient Christian Egypt (Routledge Studies in Religion)
Clothes and Monasticism in Ancient Christian Egypt (Routledge Studies in Religion)

This book is an exploration of the ideals and values of the ascetic and monastic life, as expressed through clothes. Clothes are often seen as an extension of us as humans, a determinant of who we are and how we experience and interact with the world. In this way, they can play a significant role in the embodied and...

Designing a Data Warehouse : Supporting Customer Relationship Management
Designing a Data Warehouse : Supporting Customer Relationship Management

The main subject of this book is data warehousing. A data warehouse is a special kind of database that, in recent years, has attracted a great deal of interest in the information technology industry. Quite a few books have been published about data warehousing generally, but very few have focused on the design of data...

The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
If this book is to succeed and help readers, its cardinal virtue must be to provide
a simple reference text. It should be an essential addition to an information
security library. As such it should also serve the purpose of being a quick
refresher for terms the reader has not seen since the days when one attended a
computing
...
IT-Enabled Strategic Management: Increasing Returns for the Organization
IT-Enabled Strategic Management: Increasing Returns for the Organization
We live in an age in which the value of information and knowledge has far surpassed that
of physical goods. Information resources have become a key differentiator of successful
businesses. Information technology (IT) and information systems (IS) are now integrated
in almost every aspect of business, from planning to analysis and
...
Multidimensional Programming
Multidimensional Programming
This book describes a powerful language for multidimensional declarative programming called Lucid. Lucid has evolved considerably in the past ten years. The main catalyst for this metamorphosis was the discovery that Lucid is based on intensional logic, one commonly used in studying natural languages. Intensionality, and more specifically...
CRC Handbook of Modern Telecommunications, Second Edition
CRC Handbook of Modern Telecommunications, Second Edition

Addressing the most dynamic areas of the ever-changing telecommunications landscape, this new edition of the bestselling CRC Handbook of Modern Telecommunications once again brings together the top minds and industry pioneers in wireless communication networks, protocols, and devices.

In addition to new discussions of...

Apoptosome: An up-and-coming therapeutical tool
Apoptosome: An up-and-coming therapeutical tool

"Apoptosome" is the first book that presents a concise synthesis of recent developments in the understanding of how the activation of the cell death cascade is handled by a cytosolic signalling platform known as the apoptosome.

The book also discusses how insights into the regulation of apoptosome may be exploited for designing...

Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Over the last two or three decades, elliptic curves have been playing an increasingly important role both in number theory and in related fields such as cryptography. For example, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality...
unlimited object storage image
Result Page: 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy