Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Excel Gurus Gone Wild: Do the IMPOSSIBLE with Microsoft Excel
Excel Gurus Gone Wild: Do the IMPOSSIBLE with Microsoft Excel
Drawn from actual excel conundrums posted on the author's website, www.mrexcel.com, this high-level resource is designed for people who want to stretch Excel to its limits. Tips for solving 100 incredibly difficult problems are covered in depth and include extracting the first letter of each word in a paragraph, validating...
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Hyper-V is one of the top virtualization products, and this practical guide focuses on the essentials of Windows Server 2008 Hyper-V. Written by the Microsoft team behind the Hyper-V product, this book shows you how to perform key virtualization scenarios, such as server consolidation, software test and development, and a dynamic data center and...
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide

CISSP Certified Information Systems Security Professional Study Guide Here's the book you need to prepare for the challenging CISSP exam from (ISC This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in...

IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
"I would purchase the books... since I am Ipv6 connected it would be a nice reference."..."I do think that if you buy one you will buy the other, assuming that the chapters are setup correctly." -Randall Stewart, Cisco Systems

"My immediate reaction was that I thought it would be better in one volume, BUT then I
...
Adobe Premiere Pro 2.0 Revealed
Adobe Premiere Pro 2.0 Revealed
Digital video editing continues to grow in both the educational and at-home market and "Adobe Premiere Pro X Revealed" is perfect for anyone interested in editing video on their home computer. Written for users who have no previous experience with Premiere, the book takes them step-by-step through important video editing skills using the...
Computability: Turing, Gödel, Church, and Beyond
Computability: Turing, Gödel, Church, and Beyond

In the 1930s a series of seminal works published by Alan Turing, Kurt Gödel, Alonzo Church, and others established the theoretical basis for computability. This work, advancing precise characterizations of effective, algorithmic computability, was the culmination of intensive investigations into the foundations of mathematics. In the...

CISSP : Certified Information Systems Security Professional Study Guide, Third Edition
CISSP : Certified Information Systems Security Professional Study Guide, Third Edition
CISSP Certified Information Systems Security Professional Study Guide

Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological...

Putting Knowledge Networks into Action: Methodology, Development, Maintenance
Putting Knowledge Networks into Action: Methodology, Development, Maintenance
The concepts and theories of knowledge management and networks are about to become well documented. Yet there are few, if any, guidelines on how to implement knowledge management within an organization, especially focusing on how to manage knowledge in a network environment. On the one hand, this is paraphrasing Tom Stewart’s assertion in his...
Algebra and Trigonometry, 3rd Edition
Algebra and Trigonometry, 3rd Edition

This best selling author team explains concepts simply and clearly, without glossing over difficult points. Problem solving and mathematical modeling are introduced early and reinforced throughout, providing students with a solid foundation in the principles of mathematical thinking. Comprehensive and evenly paced, the book provides complete...

Writing Scientific Software: A Guide to Good Style
Writing Scientific Software: A Guide to Good Style
The core of scientific computing is designing, writing, testing, debugging and modifying numerical software for application to a vast range of areas: from graphics, meteorology and chemistry to engineering, biology and finance. Scientists, engineers and computer scientists need to write good code, for speed, clarity, flexibility and ease of re-use....
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy