Home | Amazing | Today | Tags | Publishers | Years | Search 
Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
Oracle Enterprise Manager 10g Grid Control Implementation Guide (Osborne ORACLE Press Series)
Oracle Enterprise Manager 10g Grid Control Implementation Guide (Osborne ORACLE Press Series)

Install and Configure Grid Control to Manage Your Oracle Landscape

Build a robust grid computing infrastructure with guidance from an Oracle expert who developed and taught the Grid Control Deep Dive class to Oracle Consulting. Featuring real-world examples and best practices, Oracle...

IT Governance: How Top Performers Manage IT Decision Rights for Superior Results
IT Governance: How Top Performers Manage IT Decision Rights for Superior Results
Firms with superior IT governance have more than 25% higher profits than firms with poor governance given the same strategic objectives. These top performers have custom-designed IT governance for their strategies. Just as corporate governance aims to ensure quality decisions about all corporate assets, IT governance links IT decisions with company...
System-on-a-Chip Verification - Methodology and Techniques
System-on-a-Chip Verification - Methodology and Techniques
System-On-a-Chip Verification: Methodology and Techniques is the first book to cover verification strategies and methodologies for SOC verification from system level verification to the design sign- off. The topics covered include Introduction to the SOC design and verification aspects, System level verification in brief, Block level...
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Send: Why People Email So Badly and How to Do It Better, Revised Edition
Send: Why People Email So Badly and How to Do It Better, Revised Edition
Send—the classic guide to email for office and home and an instant success upon its publication in 2007—has become indispensable for readers navigating the impersonal, and at times overwhelming, world of electronic communication. Filled with real-life email success (and horror) stories and a wealth of useful and entertaining...
Energy Efficient Homes For Dummies (Home & Garden)
Energy Efficient Homes For Dummies (Home & Garden)
Hands-on, practical solutions to save money by making smart energy changes

One of the best and most affordable strategies people can employ to combat global warming is to improve the energy and water efficiency of their homes. Energy Efficient Homes For Dummies provides homeowners with advice, tips, and projects to reduce costs,
...
Science of Pain
Science of Pain
This is an essential reference for researchers who must understand the basic neuroscience of pain, especially underlying mechanisms, in order to develop new and more effective treatments.

This book presents the most current scientific understanding behind most common pain disorders. Clinical scientists involved in pain
...
Hybrid CMOS Single-Electron-Transistor Device And Circuit Design
Hybrid CMOS Single-Electron-Transistor Device And Circuit Design
CMOS (complementary metal oxide semiconductor) is a widely accepted and utilized technology among electrical engineers involved with circuit design. SET (single electron transistor) technology has recently gained significant attention, because it can be combined with CMOSs to improve overall performance of integrated circuits - reducing power...
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Imaging sensors are an important resource in today’s world. Further, a single sensor cannot provide a complete view of the environment in many applications. Just as humans use all five senses to great advantage, computers use image fusion algorithms to gain similar advantages. The resulting fused image, if suitably obtained from a set of...
British Military History For Dummies (History, Biography & Politics)
British Military History For Dummies (History, Biography & Politics)
"a ‘who, what, when, where and why’ of military events in Britain from the Romans to the present day." (Family Tree Magazine, September 2007)

"Although the chapter titles and subtitles are jokey, the content is solidly descriptive...a very useful one-volume reference book." (Ancestors,...

Geometric Spanner Networks
Geometric Spanner Networks
Aimed at an audience of researchers and graduate students in computational geometry and algorithm design, this book uses the Geometric Spanner Network Problem to showcase a number of useful algorithmic techniques, data structure strategies, and geometric analysis techniques with many applications, practical and theoretical. The authors present...
Result Page: 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy