Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

CCSP SECUR Exam Cram 2 (642-501)
CCSP SECUR Exam Cram 2 (642-501)

Exam Cram 2 fills the needs of 1,000s of Certified Security Specialists and new security cert candidates looking to upgrade to a CCSP.

  • SECUR is the first and most important of the 5 required exams to obtain a CCSP.

  • ...
The Variational Bayes Method in Signal Processing
The Variational Bayes Method in Signal Processing
This is the first book-length treatment of the Variational Bayes (VB) approximation in signal processing. It has been written as a self-contained, self-learning guide for academic and industrial research groups in signal processing, data analysis, machine learning, identification and control. It reviews the VB distributional approximation, showing...
Inquiring Organizations: Moving From Knowledge Management To Wisdom
Inquiring Organizations: Moving From Knowledge Management To Wisdom
Inquiring Organizations: Moving from Knowledge Management to Wisdom assembles into one volume a comprehensive collection of the key current thinking regarding the use of C. West Churchman's Design of Inquiring Systems as a basis for computer-based inquiring systems design and implementation. Inquiring systems are systems that go beyond knowledge...
An Introduction to Knowledge Engineering
An Introduction to Knowledge Engineering
An Introduction to Knowledge Engineering presents a simple but detailed exploration of current and established work in the field of knowledge-based systems and related technologies. Its treatment of the increasing variety of such systems is designed to provide the reader with a substantial grounding in such technologies as expert systems, neural...
Living Energies: An Exposition of Concepts Related to the Theories of Viktor Schauberger
Living Energies: An Exposition of Concepts Related to the Theories of Viktor Schauberger
It is very difficult to observe the extraordinary creativity and fruitfulness of Nature without a sense of wonder. But wonder is at odds with reason. It has been said that humanity's schism with Nature was contrived so that we could develop our sense of reason to the extent that we now experience. One of the outcomes of this, because they are...
Social Media Playbook for Business: Reaching Your Online Community with Twitter, Facebook, LinkedIn, and More
Social Media Playbook for Business: Reaching Your Online Community with Twitter, Facebook, LinkedIn, and More

Social media can be an incredibly powerful marketing tool that brings a company or organization huge rewards. But for beginners in this new world, the potential risks are also high. Consumers are particularly passionate in the online world; the most active social networkers are poised to be your brand's gushing fans—or your most...

Terrorism, Technology and Apocalyptic Futures
Terrorism, Technology and Apocalyptic Futures
This book centers on the power of mythical narratives and technology in creating the idea of a world that should be purged. The introduction of sin, the fall and other disruptive conflict have led mankind towards a world of scarcity, where suffering and sacrifice prevail. The author analyzes this apocalypse theory, which describes...
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)

The MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network Study Guide (Exam 70-214) is a one-of-a-kind integration text and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft Exam 70-214 objectives.

  • Completely Guaranteed Coverage of All...
Quiet Mind, Fearless Heart: The Taoist Path through Stress and Spirituality
Quiet Mind, Fearless Heart: The Taoist Path through Stress and Spirituality
"Reading Quiet Mind, Fearless Heart is like eavesdropping on a conversation between Lao Tzu and Joseph Campbell—a pure pleasure to read!"
—Deepak Chopra, M.D., coauthor of The Seven Spiritual Laws of Yoga and author of The Spontaneous Fulfillment of Desire

"Quiet Mind, Fearless Heart is an enchanting piece...

Getting the Most from Online Learning: A Learner's Guide
Getting the Most from Online Learning: A Learner's Guide
Getting the Most from Online Learning is a must-have resource that helps people become better e-learners by showing them how to prepare for, participate in, and apply e-learning in all its variations. Written by the leaders in e-learning, this book is filled with practical ideas, suggestions, and information about a wide variety of topics including...
Algorithms in C
Algorithms in C
Algorithms in C is a comprehensive repository of algorithms, complete with code. If you're in a pinch and need to code something up fast, this book is the place to look. Starting with basic data structures, Algorithms in C covers an enormous scope of information, with extensive treatment of searching and advanced data structures,...
unlimited object storage image
Result Page: 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy