Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Financing Information and Communication Infrastructure Needs in the Developing World: Public and Private Roles
Financing Information and Communication Infrastructure Needs in the Developing World: Public and Private Roles
Over the past ten years, private-sector-led growth has revolutionized access to telecommunications. Every region of the developing world benefitted in terms of investment and rollout. This revolution would have been impossible without government reform and oversight. Advanced information and communication infrastructure (ICI) are increasingly...
Sams Teach Yourself SAP in 24 Hours (4th Edition)
Sams Teach Yourself SAP in 24 Hours (4th Edition)

When I was asked to update Sams Teach Yourself SAP in 24 Hours, I was completely thrilled. Seriously! The world of SAP and our world in general have gone through major upheavals in the last few years, and I was excited to share with SAPlings and veterans alike just how much had changed. In the same way, I was anxious to realign and...

Fundamentals of Geobiology
Fundamentals of Geobiology

2012 PROSE Award, Earth Science: Honorable Mention

For more than fifty years scientists have been concerned with the interrelationships of Earth and life. Over the past decade, however, geobiology, the name given to this interdisciplinary endeavour, has emerged as an exciting and rapidly expanding field,
...

Ansible Configuration Management
Ansible Configuration Management

Configuring your Linux infrastructure using Ansible is made logical and highly accessible when you follow this step-by-step tutorial. Combining a clear overview with the deeper details, it gives a solid grounding to managing your systems.

Overview

  • Starts with the most simple usage of Ansible and builds on...
Genetic Toxicology and Cancer Risk Assessment
Genetic Toxicology and Cancer Risk Assessment

Presents state-of-the-art regulatory cancer risk assessment models including a biologically based model for two-hit carcinogenesis and cell proliferation!

This book comprehensively reviews the various roles of genetic toxicology in human cancer risk assessment conducted by United States and worldwide regulatory
...

Drupal 6 Social Networking
Drupal 6 Social Networking
Build a social or community web site, with friends lists, groups, custom user profiles, and much more
  • Step-by-step instructions for putting together a social networking site with Drupal 6
  • Customize your Drupal installation with modules and themes to match the needs of almost any social networking site
  • ...
Cell Line Development (Cell Engineering)
Cell Line Development (Cell Engineering)

Mammalian cell lines command an effective monopoly for the production of therapeutic proteins that require post-translational modifications. This unique advantage outweighs the costs associated with mammalian cell culture, which are far grater in terms of development time and manufacturing when compared to microbial culture. The development of...

Selenium in Food and Health
Selenium in Food and Health
Selenium is a contradictory nutrient. It has been called the essential poison—too much of it in the diet can be toxic; too little can result in chronic, and sometimes fatal, deficiency. Even health authorities have at times been confused. Although today in the USA, as in most other countries, selenium appears among the trace...
International Assignments: An Integration of Strategy, Research, and Practice
International Assignments: An Integration of Strategy, Research, and Practice
Although the authors of this book and I approach the strategic challenges of globalization
from different perspectives, we've come to a similar conclusion: that the
"people" imperative is often overlooked when companies decide to enter new
countries or world regions. Stroh, Black, Mendenhall, and Gregersen base their...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Advanced .NET Remoting, Second Edition
Advanced .NET Remoting, Second Edition

With the arrival of .NET remoting, any programmer who wants to work with distributed objects can benefit from Advanced .NET Remoting, a solid tour of basic and expert techniques for working with distributed code on Microsoft's newest platform.

This title's concise, code-centered approach, backed up by judicious...

unlimited object storage image
Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy