Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Tomcat: The Definitive Guide
Tomcat: The Definitive Guide
It takes a book as versatile as its subject to cover Apache Tomcat, the popular open source Servlet and JSP container and high performance web server. Tomcat: The Definitive Guide is a valuable reference for administrators and webmasters, a useful guide for programmers who want to use Tomcat as their web application server during...
Architecture and Methods for Flexible Content Management in Peer-to-Peer Systems
Architecture and Methods for Flexible Content Management in Peer-to-Peer Systems

At times when the IT manager’s best friend is systems consolidation (which is a euphemism for centralisation), it may come somewhat as a surprise for you that this book investigates decentralisation in the context of content management systems. It may seem quite obvious
that content will and should be managed by the party who
...

Fibrogenesis: Cellular and Molecular Basis (Medical Intelligence Unit)
Fibrogenesis: Cellular and Molecular Basis (Medical Intelligence Unit)
This book is written to provide in-depth and current information on the molecular basis of fibrotic diseases in various tissues and organs. Why do we need a new book on fibrosis? Several currently available books on fibrosis are mostly devoted to specific tissue or organ systems; in contrast, this book is especially designed to...
CompTIA Linux+ Study Guide: Exams LX0-101 and LX0-102
CompTIA Linux+ Study Guide: Exams LX0-101 and LX0-102

The Best Test Prep for the CompTIA Linux+ Powered By LPI Exams

One of Sybex's most popular certification Study Guides, CompTIA Linux+ Study Guide, Second Edition thoroughly prepares candidates for the CompTIA Linux+ Powered by LPI exams (LX0-101 and LX0-102). In addition to full coverage of all exam objectives for both...

Recent Progress in Data Engineering and Internet Technology: Volume 2 (Lecture Notes in Electrical Engineering)
Recent Progress in Data Engineering and Internet Technology: Volume 2 (Lecture Notes in Electrical Engineering)

The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing...

Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Breast Cancer: Translational Therapeutic Strategies (Translational Medicine)
Breast Cancer: Translational Therapeutic Strategies (Translational Medicine)

Considering the impact of translational breakthroughs on the early detection, diagnosis, prevention, and treatment of breast cancer, this all-encompassing guide collects cutting-edge research on the most promising strategies and agents likely to impact the management and long-term outcomes of women with breast cancer. This book will provide...

Advanced Clinical Skills for GU Nurses (Wiley Series in Nursing)
Advanced Clinical Skills for GU Nurses (Wiley Series in Nursing)

This book has been developed to help nurses who are in nurse practitioner roles by supporting them to develop their 'advanced practice skills'. This book is intended to build on skills and knowledge that nurses will have acquired at staff nurse level. It is intended that this book will develop skills and knowledge which until recently...

Advanced Practice Nursing: Emphasizing Common Roles
Advanced Practice Nursing: Emphasizing Common Roles

Prepare your graduate students to take leadership roles inthe future of Advance Practice Nursing. The author address the major issuesfacing Advanced Practice Nursing today from a collective perspective thatbegins with its historical roots and progresses to contemporary concerns andtrends. This approach enables APNs to understanding the...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Strategic Computing: DARPA and the Quest for Machine Intelligence, 1983-1993 (History of Computing)
Strategic Computing: DARPA and the Quest for Machine Intelligence, 1983-1993 (History of Computing)
This is the story of an extraordinary effort by the U.S. Department of Defense to hasten the advent of "machines that think." From 1983 to 1993, the Defense Advanced Research Projects Agency (DARPA) spent an extra $1 billion on computer research aimed at achieving artificial intelligence. The Strategic Computing Initiative (SCI) was...
Oracle Enterprise Manager 12c Command-Line Interface
Oracle Enterprise Manager 12c Command-Line Interface

Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager’s powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock...

unlimited object storage image
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy