Home | Amazing | Today | Tags | Publishers | Years | Search 
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

A company’s most important asset next to its people is its information. This information includes intellectual property, company financial information, confidential employee information, customer information, and so much more. Company information may be stored in databases, spreadsheets, flat files, and so on. Loss of...

The Multiplayer Classroom: Designing Coursework as a Game
The Multiplayer Classroom: Designing Coursework as a Game

Discover how to engage your students and raise their grades and attendance in your classroom. THE MULTIPLAYER CLASSROOM: DESIGNING COURSEWORK AS A GAME is your detailed guide to designing any structured learning experience as a game. Written for professional educators or those learning to be educators, here are the tools to engage and excite...

Drinking Water and Infectious Disease: Establishing the Links
Drinking Water and Infectious Disease: Establishing the Links

There still exists considerable uncertainty in many countries about the contribution of drinking water to sporadic cases of disease. The Organization for Economic Cooperation and Development (OECD), in cooperation with the World Health Organization (WHO), led the Workshop on Molecular Technologies for Safe Drinking Water in 1998 to address...

Computational and Instrumental Methods in EPR (Biological Magnetic Resonance)
Computational and Instrumental Methods in EPR (Biological Magnetic Resonance)

Electron magnetic resonance in the time domain has been greatly facilitated by the introduction of novel resonance structures and better computational tools, such as the increasingly widespread use of density-matrix formalism. This second volume in our series, devoted both to instrumentation and computation, addresses applications and...

Smashing WordPress Themes: Making WordPress Beautiful (Smashing Magazine Book Series)
Smashing WordPress Themes: Making WordPress Beautiful (Smashing Magazine Book Series)

Smashing WordPress Themes is all about making your WordPress site look beautiful. But, the beautiful part is a very personal thing, because we all have different preferences. So in essence, my book isn’t on Web design, but rather about giving you, dear reader, the tools to build the kind of site that you want to create, using WordPress...

HTML5 Geolocation
HTML5 Geolocation

This book explores the W3C Geolocation API, a specification that provides scripted access to geographical location information associated with a hosted device.* This API defines objects that can be used in JavaScript to ascertain the position of the device on which the code is executed.

Truly revolutionary: now...

ALGORITHMS FOR LINEAR-QUADRATIC OPTIMIZATION
ALGORITHMS FOR LINEAR-QUADRATIC OPTIMIZATION

Linear-quadratic optimization is one of the most exciting topics in the con trol engineering literature of recent decades. The interest in linear optimal dynamical systems, and especially in those with quadratic cost functional, can be explained by both the richness of properties these systems possess, and the pragmatic value and physical...

Windows PowerShell in Action, Second Edition
Windows PowerShell in Action, Second Edition

Well, it’s been a wild ride since the first edition of this book was released. At that time, PowerShell had just shipped and had a fairly limited scope of influence. Things have changed a lot. PowerShell now ships in the box with Windows (at least Windows 7 and Server 2008 R2). The number of PowerShell users is now in the hundreds...

Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

Enterprise Content Management - A Business and Technical Guide
Enterprise Content Management - A Business and Technical Guide

Information is the lifeblood of knowledge, the flotsam of events and perspectives created in every second of history. There is so much to capture and yet so little time and so few resources to make sense of it all. Just as we get tantalisingly close, the holy grail of true knowledge slips further over the horizon.

To capture...

Web-based Education: Concepts, Methodologies, Tools and Applications
Web-based Education: Concepts, Methodologies, Tools and Applications

In an age where online universities and distance learning courses exist side by side with traditional classroom learning, the development, design, use and challenges of creating web-based learning systems that promote learning in students, whether over a distance or within a university proper, is increasingly complex and often...

Multiscale Modelling and Simulation (Lecture Notes in Computational Science and Engineering)
Multiscale Modelling and Simulation (Lecture Notes in Computational Science and Engineering)

These Lecture Series in Computational Science and Engineering include the proceedings of a Summer Program in Multi-Scale Modelling and Simulation held in Lugano, Switzerland, between August 4th and 30th, 2003. The workshop was organized by the ETHZ Computational Laboratory (CoLab) together with the Swiss Center for Scientific...

Result Page: 680 679 678 677 676 675 674 673 672 671 670 669 668 667 666 665 664 663 662 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy