Home | Amazing | Today | Tags | Publishers | Years | Search 
Exchange Server 2010 Administration: Real World Skills for MCITP Certification and Beyond
Exchange Server 2010 Administration: Real World Skills for MCITP Certification and Beyond

Over the years, Exchange Server has become a complicated messaging solution that many organizations rely on. Many companies have not upgraded to Exchange Server 2007 and are still using Exchange Server 2003. With the release of Exchange Server 2010, they are now contemplating upgrading to take advantage of this new version’s...

Inductive Databases and Constraint-Based Data Mining
Inductive Databases and Constraint-Based Data Mining

This book is about inductive databases and constraint-based data mining, emerging research topics lying at the intersection of data mining and database research. The aim of the book as to provide an overview of the state-of- the art in this novel and exciting research area. Of special interest are the recent methods for constraint-based...

Mastering Hyper-V Deployment
Mastering Hyper-V Deployment

I have been working with Hyper-V since the beta release of it for Windows Server 2008. There was a lot to learn with the brand new product. It quickly became evident that Hyper-V was just a tiny piece of the entire puzzle. A Hyper-V project is much more than just a virtualization project. It is a project that will change how your server...

Operating Systems In Depth: Design and Programming
Operating Systems In Depth: Design and Programming

The goal of this book is to bring together and explain current practice in operating systems. This includes much of what is traditionally covered in operating-system textbooks: concurrency, scheduling, linking and loading, storage management (both real and virtual), fi le systems, and security. However, I also cover issues that come up...

IT Audit, Control, and Security (Wiley Corporate F&A)
IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has changed in information technology (IT) auditing since we published our first edition of this book when we were then called Computer Auditors. Back in those days, traditional mainframe or legacy computer systems were still common, we had difficulty envisioning...
Invisible Capital: How Unseen Forces Shape Entrepreneurial Opportunity
Invisible Capital: How Unseen Forces Shape Entrepreneurial Opportunity

Writer, consultant and speaker Chris Rabb coined the term "invisible capital" to represent the unseen forces that dramatically impact entrepreneurial viability when a good attitude, a great idea, and hard work simply aren't enough.

In his book, Invisible Capital: How Unseen Forces Shape
...

Data Mining in Proteomics: From Standards to Applications (Methods in Molecular Biology)
Data Mining in Proteomics: From Standards to Applications (Methods in Molecular Biology)

Through the rapid development of proteomics methods and technologies, an enormous amount of data was created, leading to a wide-spread rethinking of strategy design and data interpretation. In Data Mining in Proteomics: From Standards to Applications, experts in the field present these new insights within the proteomics community, taking the...

Land of Lisp: Learn to Program in Lisp, One Game at a Time!
Land of Lisp: Learn to Program in Lisp, One Game at a Time!

Lisp has been hailed as the world's most powerful programming language, but its cryptic syntax and academic reputation can be enough to scare off even experienced programmers. Those dark days are finally over—Land of Lisp brings the power of functional programming to the people!

With his brilliantly...

Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

HTML & XHTML DeMYSTiFieD
HTML & XHTML DeMYSTiFieD

Congratulations! Your purchase of this book shows that you are a highly motivated student. You want as much out of your HTML class as possible. This book will help you to become the best HTML developer possible.

Hard stuff made easy! Your practical, self-paced guide to HTML and XHTML

HTML and XHTML Demystified...

No Such Thing as Small Talk: 7 Keys to Understanding German Business Culture
No Such Thing as Small Talk: 7 Keys to Understanding German Business Culture

Many business leaders, when they begin to work overseas or interact professionally with teams abroad, are surprised by how much they thought they knew about the other culture, but how little it counts for on the ground. The reality is that communication is multi-dimensional, and simply knowing a foreign language doesn't mean one...

Result Page: Previous 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy