Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Communications Satellites: Global Change Agents (Telecommunications Series)
Communications Satellites: Global Change Agents (Telecommunications Series)

Over the past 40 years, satellites have played a key role in creating a global culture, spreading worldwide entertainment, stimulating technological interchange, and promoting trade around the world. Communications Satellites: Global Change Agents addresses communications satellites not only in terms of the technology and the services...

Operating Systems In Depth: Design and Programming
Operating Systems In Depth: Design and Programming

The goal of this book is to bring together and explain current practice in operating systems. This includes much of what is traditionally covered in operating-system textbooks: concurrency, scheduling, linking and loading, storage management (both real and virtual), fi le systems, and security. However, I also cover issues that come up...

Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
Pro SQL Server 2012 Practices
Pro SQL Server 2012 Practices

Pro SQL Server 2012 Practices is an anthology of high-end wisdom from a group of accomplished database administrators who are quietly but relentlessly pushing the performance and feature envelope of Microsoft SQL Server 2012. With an emphasis upon performance—but also branching into release...

Radiobiology and Environmental Security (NATO Science for Peace and Security Series C: Environmental Security)
Radiobiology and Environmental Security (NATO Science for Peace and Security Series C: Environmental Security)

This volume - like the N.A.T.O. Advanced Research Workshop on which it is based - addresses the fundamental science that contributes to our understanding of the potential risks from ecological terrorism, i.e. dirty bombs, atomic explosions, intentional release of radionuclides into water or air. Both effects on human health (D.N.A. and...

Telerik WPF Controls Tutorial
Telerik WPF Controls Tutorial

Telerik controls and Windows Presentation Foundation (WPF) are a winning combination, and this tutorial will give you the skills you need to create powerful applications. You'll need to know C#, SQL, and object-oriented design.

Overview

  • Display database information in the Telerik WPF controls
  • ...
Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform
Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform

Are you facing a challenging Salesforce.com problem--say, relating to automation, configuration, formulation, or reporting--that you can't quite crack? Or maybe you are hoping to infuse some creativity into your solution design strategy to solve problems faster or make solutions more efficient? Practical Salesforce.com Development...

Practical Zendesk Administration
Practical Zendesk Administration
"Reading these chapters is like reading the advanced manual we never wrote when we designed the product. Stafford and Anton's ability to enlighten readers on how to use the product better and the reasons for the design decisions in Zendesk never ceases to impress us."
-Mikkel Svane, Founder and CEO at
...
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...

Security + Exam Guide (Testtaker's Guide Series)
Security + Exam Guide (Testtaker's Guide Series)

The Security+ Exam Guide provides exam candidates with the concepts, objectives, and test-taking skills needed to pass on their first attempt. Instead of covering every computer security topic, this book isolates those topics most likely to be addressed on the exam. Written by an experienced network administrator and CompTIA...

unlimited object storage image
Result Page: 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 356 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy