11th_Dimension-Paramnesia-WEB-2018-ENTiTLED | Michael Brown | Rodney Afif
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise
The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise

Achieve streamlined, rapid production with enterprise-level DevOps

Awarded DevOps 2017 Book of the Year, The DevOps Adoption Playbook provides practical, actionable, real-world guidance on implementing DevOps at enterprise scale. Author Sanjeev Sharma heads the DevOps practice for IBM; in this book, he provides unique...

Securing the Internet of Things
Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...

The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)
The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)

Extensively revised to reflect improved Scrum practices and tools, this edition adds an all-new section of tips from the field. 



The 1st Edition has a 5-Star Amazon Customer Rating and 135 reviews.

Thousands of organizations are adopting Scrum to
...
Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

The Perfectionist's Handbook: Take Risks, Invite Criticism, and Make the Most of Your Mistakes
The Perfectionist's Handbook: Take Risks, Invite Criticism, and Make the Most of Your Mistakes

A guide for getting your perfectionism to work for you

Is perfectionism a good thing or does it get in our way? In The Perfectionist's Handbook, clinical psychologist Jeff Szymanski helps readers navigate their way out of the "perfectionism paradox": if your intentions are good (wanting to excel) and the...

Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project

Projects--especially complex ones--are inherently risky. Between time constraints, technical challenges, and resource issues, things can easily go wrong--making the identification of potential risks an essential component of every project manager's job. Fully updated and consistent with the Risk Management Professional (RMP) certification...

The Effective Incident Response Team
The Effective Incident Response Team

When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and...

Diabetes and Carb Counting For Dummies (For Dummies (Lifestyle))
Diabetes and Carb Counting For Dummies (For Dummies (Lifestyle))

Count your carbs — and count on managing your diabetes

Living with diabetes doesn't have to mean giving up all of your favorite foods. Carbs from healthy foods boost nutrition and supply essential fuel for your brain and body. Counting carbs is integral to managing diabetes because your carb choices, portion sizes,...

Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)

Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure...

Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Learning SAP Analytics Cloud
Learning SAP Analytics Cloud

Key Features

  • Predict new opportunities and risks in a few mouse clicks
  • Eliminate complexity with tools that let you plan, analyze, and collaborate in context—in real time
  • Discover, visualize, plan, and predict in a single product with agile BI tools

Book...

Gastric Bypass Surgery: Everything You Need to Know to Make an Informed Decision
Gastric Bypass Surgery: Everything You Need to Know to Make an Informed Decision

Some 22 million Americans are morbidly obese. For many of them, gastric bypass surgery appears to offer the only hope of long-term weight loss. Once viewed as a radical weight-loss alternative, the surgery is becoming increasingly popular. In 2002, more than 100,000 Americans elected to have the procedure done.

Written by a medical...

Result Page: 44 43 42 41 40 39 38 37 36 35 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy