|
|
|
|
Cloud Capacity Management (Expert's Voice in Information Technology)
Cloud Capacity Management helps readers in understanding what the cloud, IaaS, PaaS, SaaS are, how they relate to capacity planning and management and which stakeholders are involved in delivering value in the cloud value chain. It explains the role of capacity management for a creator, aggregator, and consumer of cloud... | | Handbook of Systems and Complexity in Health
This book is an introduction to health care as a complex adaptive system, a system that feeds back on itself. The first section introduces systems and complexity theory from a science, historical, epistemological, and technical perspective, describing the principles and mathematics. Subsequent sections build on the health applications of... | | Early Days of X-ray Crystallography (International Union of Crystallography)
The year 2012 marked the centenary of one of the most significant discoveries of the early twentieth century, the discovery of X-ray diffraction (March 1912, by Laue, Friedrich and Knipping) and of Bragg's law (November 1912). The discovery of X-ray diffraction confirmed the wave nature of X-rays and the space-lattice hypothesis. It had... |
|
|
| | Integration of ICT in Smart OrganizationsThe production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production... | | Lightwave 3D Character AnimationThis book is for anyone who has ever had a character in their heart that they’ve wanted to bring to life with as much fluidity, power, and grace as can be seen in the best animated feature films. This is a book for anyone who has wanted to become an animator but hasn’t gone to Sheridan College in Toronto or CalArts in Valencia. This is... |
|
Hacking Exposed: Network Security Secrets & SolutionsIn today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz... | | Network Security Assessment: From Vulnerability to PatchThis book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.
This is unique in that it details both the management and technical skill and tools... | | |
|
|
Result Page: 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 |