Notice: Undefined property: stdClass::$formattedPrice in /home/ebooks-gratuits/public_html/sources/getbingweb.php on line 166
Protocols - ebooks-gratuits.me



Lancer votre recherche de document sur le web et trouver tous les livres correspondants
Menu



Top 20


20 Nouveautés


Liste

Résultats pour

Protocols

(Temps écoulé : 2.9310)
Liens Sponsorislés


Computer
Networking
Principles
Practice
1 Computer Networking: Principles, Protocols, and Practice - Olivier Bonaventure
Auteur : Olivier Bonaventure
Genre : Ordinateurs
Computer Networking: Principles, Protocols, and Practice was re-licensed as CC-BY through the Open Textbook Challenge by Saylor.org, a free and open collection of more than 240 college level courses. Look for more of our materials at the Saylor.org iTunes U page.

Computer Networking: Principles, Protocol, and Practice was written and submitted to the Open Textbook Challenge by Dr. Olivier Bonaventure of the Université catholique de Louvain (UCL) in Louvain-la-Neuve, Belgium. He also serves as the Education Director of ACM SIGCOMM. Computer Networking has already been used by several universities around the world, including UCL.

Gratuit

Laboratory
2 Laboratory Protocols - Fanny Chapelin, Graham Beck, Olga Lenkov & Heike Daldrup-link
Auteur : Fanny Chapelin, Graham Beck, Olga Lenkov & Heike Daldrup-link
Genre : Science et nature
This book describes classic cell extraction, cell culture, histology and staining protocols. Visual support such as step-by-step photo galleries or movies will help you through all the steps of the protocol.

Gratuit

Prudence
3 Prudence - Gail Carriger
Auteur : Gail Carriger
Genre : Fantasy
ON BEHALF OF QUEEN, COUNTRY . . . AND THE PERFECT POT OF TEA

When Prudence Alessandra Maccon Akeldama (Rue to her friends) is given an unexpected dirigible, she does what any sensible female would under similar circumstances - names it the Spotted Crumpet and floats to India in pursuit of the perfect cup of tea.

But India has more than just tea on offer. Rue stumbles upon a plot involving local dissidents, a kidnapped brigadier's wife and some awfully familiar Scottish werewolves. Faced with a dire crisis and an embarrassing lack of bloomers, what else is a young lady of good breeding to do but turn metanatural and find out everyone's secrets, even thousand-year-old fuzzy ones?

5,49 €

Imprudence
4 Imprudence - Gail Carriger
Auteur : Gail Carriger
Genre : Fantasy
From New York Times bestselling author Gail Carriger comes the stunning sequel to Prudence.

Rue and the crew of the Spotted Custard return from India with revelations that shake the foundations of England's scientific community. Queen Victoria is not amused, the vampires are tetchy, and something is wrong with the local werewolf pack. To top it all off, Rue's best friend Primrose keeps getting engaged to the most unacceptable military types.

Rue has family problems as well. Her vampire father is angry, her werewolf father is crazy, and her obstreperous mother is both. Worst of all, Rue's beginning to suspect that what they really are . . . is frightened.

6,49 €

Competence
Custard
Protocol
5 Competence: Custard Protocol - Gail Carriger
Auteur : Gail Carriger
Genre : Science-fiction
From New York Times bestselling author Gail Carriger comes the delightful sequel to Imprudence.

Accidentally abandoned!

All alone in Singapore, proper Miss Primrose Tunstell must steal helium to save her airship, the Spotted Custard, in a scheme involving a lovesick werecat and a fake fish tail.

When she uncovers rumors of a new kind of vampire, Prim and the Custard crew embark on a mission to Peru. There, they encounter airship pirates and strange atmospheric phenomena, and are mistaken for representatives of the Spanish Inquisition. Forced into extreme subterfuge (and some rather ridiculous outfits) Prim must also answer three of life's most challenging questions:

Can the perfect book club give a man back his soul?

Will her brother ever stop wearing his idiotic velvet fez?
5,99 €

Protocol
6 The Protocol - J. Robert Kennedy
Auteur : J. Robert Kennedy
Genre : Action et aventure
*** BOOK #1 OF THE MILLION-SELLING SERIES ON SALE NOW! ***

THE FINAL SKULL HAS BEEN FOUND. NOW ALL HELL'S BREAKING LOOSE.

For two thousand years, the Triarii have protected us, influencing history from the Crusades to the discovery of America. Descending from the Roman Empire, they pervade every level of society, and are now in a race with our own government to retrieve an ancient artifact thought to have been lost forever.

Caught in the middle is Archaeology Professor James Acton, relentlessly hunted by the elite Delta Force, under orders to stop at nothing to possess what he has found, and the Triarii, equally determined to prevent the discovery from falling into the wrong hands.

With his students and friends dying around him, Acton flees to find the one person who might be able to help him, but little does he know he

Gratuit
7 Liens Sponsorislés

Protocol
8 Rogue Protocol - Martha Wells
Auteur : Martha Wells
Genre : Aventure
Rogue Protocol is the third entry in Martha Wells's Hugo, Nebula, Alex, and Locus Award-winning, New York Times and USA Today bestselling series, The Murderbot Diaries.

Starring a human-like android who keeps getting sucked back into adventure after adventure, though it just wants to be left alone, away from humanity and small talk.

Who knew being a heartless killing machine would present so many moral dilemmas?

Sci-fi’s favorite antisocial A.I. is back on a mission. The case against the too-big-to-fail GrayCris Corporation is floundering, and more importantly, authorities are beginning to ask more questions about where Dr. Mensah's SecUnit is.

And Murderbot would rather those questions went away. For good.

"I love Murderbot!"--New York Times bestselling author Ann Leckie

9,99 €

Protocol
9 The Fourth Protocol - Frederick Forsyth
Auteur : Frederick Forsyth
Genre : Policier et suspense
The chilling thriller from an international bestselling phenomenon.

Plan Aurora, hatched in a remote dacha in the forest outside Moscow and initiated with relentless brilliance and skill, is a plan within a plan that, in its spine-chilling ingenuity, breaches the ultra-secret Fourth Protocol and turns the fears that shaped it into a living nightmare.

A crack Soviet agent, placed under cover in a quiet English country town, begins to assemble a jigsaw of devastation. MI5 investigator John Preston, working against the most urgent of deadlines, leads an operation to prevent the act of murderous destruction aimed at tumbling Britain into revolution...

8,49 €

Hashimoto
Protocol
10 Hashimoto's Protocol - Izabella Wentz, PharmD.
Auteur : Izabella Wentz, PharmD.
Genre : Forme et santé
Instant #1 New York Times Bestseller

Dr. Izabella Wentz, the author of the phenomenal New York Times bestseller Hashimoto’s Thyroiditis, returns with a long-awaited, groundbreaking prescription to reverse the symptoms of this serious autoimmune condition that is becoming one of the country’s fastest growing diseases.

More than thirty-five million Americans currently suffer from Hashimoto’s—an autoimmune disease that affects the thyroid gland and causes the body to attack its own cells. To alleviate the symptoms of this debilitating condition—including chronic cough, acid reflux, IBS, allergies, chronic pain, hair loss, brain fog, and forgetfulness—patients are often prescribed synthetic hormones that have numerous life-altering side effects.

But there is a better way.

Diagnosed with Hashimoto’s at twenty-seven, pharmacist Dr. Iz

15,99 €

Illustrated
11 TCP/IP Illustrated, Volume 1: The Protocols, 2/e - Kevin R. Fall & W. Richard Stevens
Auteur : Kevin R. Fall & W. Richard Stevens
Genre : Réseau
This is the eBook version of the printed book.

“For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable.”

–Vint Cerf, Internet pioneer

TCP/IP Illustrated, Volume 1, Second Edition, is a complete, detailed, and visual guide to today’s TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There’s no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks.

Starting from the late W. Richard Stevens’ classic first edition, author Kevin R. Fall adds his cutting-edge ex

42,99 €

Hormone
12 The Hormone Cure - Sara Gottfried
Auteur : Sara Gottfried
Genre : Forme et santé
ALL TOO OFTEN WOMEN ARE TOLD that feeling moody, asexual, tapped out, dried up, stressed out, and sleep deprived is just a part of being female. Or they’re led to believe that the answer can be found only at the bottom of a bottle of prescription pills. Dr. Sara Gottfried, a Harvard-educated physician and nationally recognized, board-certified gynecologist, refuses to accept that being a woman means feeling overwhelmed or that popping pills is the new normal. In The Hormone Cure, she shares the unique hormone-balancing program that she has used to help thousands of women reclaim wellness, verve, and optimal health.

Combining natural therapies with rigorous scientific testing and using an informative questionnaire to identify the common causes of hormonal imbalance, Dr. Gottfried provides an individualized plan in nonjudgmental and thoughtful language. Based on ten years’

14,99 €

Applied
Cryptography
13 Applied Cryptography - Bruce Schneier
Auteur : Bruce Schneier
Genre : Ordinateurs
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the imp

44,99 €

Protocol
14 Protocol - Kathleen Valenti
Auteur : Kathleen Valenti
Genre : Policier et suspense
“A page-turner! Smart, fast-paced and surprising.” – Hank Phillippi Ryan, Mary Higgins Clark Award-Winner, Author of Say No More

Freshly minted college graduate Maggie O’Malley embarks on a career fueled by professional ambition and a desire to escape the past. As a pharmaceutical researcher, she’s determined to save lives from the shelter of her lab. But on her very first day she’s pulled into a world of uncertainty. Reminders appear on her phone for meetings she’s never scheduled with people she’s never met. People who end up dead. 

With help from her best friend, Maggie discovers the victims on her phone are connected to each other and her new employer. She soon unearths a treacherous plot that threatens her mission—and her life. Maggie must unlock deadly secrets to stop horrific abuses of power before death comes calling for her.<

3,99 €

Protocol
15 The Wahls Protocol - Dr Terry Wahls
Auteur : Dr Terry Wahls
Genre : Régime spécial
After progressive multiple sclerosis landed Dr Wahls in a tilt/recline wheelchair, she exhaustively researched autoimmune disease and brain biology, and embraced the concepts of functional medicine. Determined to overcome her initial dismal diagnosis,, she made a choice to rely on food as her medicine and begun using paleo concepts as guidelines for her unique, nutrient rich plan. As her broken biochemistry began to fix itself, Dr Wahls soon retained full mobility and left her wheel chair behind for good.
Dr Wahls transformation was nothing short of miraculous, and she knew these treatments could be life-changing for anyone struggling with an autoimmune condition. Now, Dr Wahls shares her pioneering research along with three levels of nutrient-rich diets that can help you reverse the debilitating symptoms of your disease. The Wahls Protocol gave Dr Wahls her life back. Give it the

12,99 €

Protocol
Oriented
Programming
Edition
16 Swift 4 Protocol-Oriented Programming - Third Edition - Jon Hoffman
Auteur : Jon Hoffman
Genre : Ordinateurs
Build fast and powerful applications by harnessing the power of protocol-oriented programming in Swift 4 About This Book • Leverage the power of protocol-oriented programming in your applications and learn from real-world use cases • Create a flexible code base with protocols and protocol extensions • Leverage the power of generics in Swift 4 to create very flexible frameworks Who This Book Is For This book is for Swift developers who want to learn and implement protocol-oriented programming in their real-world applications.. What You Will Learn • Understand the differences between object-oriented programming and protocol-oriented programming • Explore the different types that Swift offers and what pitfalls to avoid • Delve into generics and generic programming • Learn how to implement Copy-On-Write within your custom types • Implement several design patterns in a p

30,99 €

Protocol
17 The Piper Protocol - Tracy Piper & Eve Adamson
Auteur : Tracy Piper & Eve Adamson
Genre : Forme et santé
Ever wonder why movie stars, supermodels, and some of the most high-profile musicians and athletes look so camera-ready? Why they don't have poochy stomachs, puffy eyes, dull tired skin, and fatigue like most of the rest of us? Why do they look so vibrant, energetic, and slim? Hollywood's best-kept secret, A-list celebrity cleanse expert Tracy Piper, knows exactly how they got that way: It's internal fitness, and Tracy is the master. Now, in The Piper Protocol, Tracy makes her life-changing, body-transforming plan available to everyone!

Tracy's cleanse program offers an amazing promise: lose up to twenty-five pounds in the first month. But weight loss is just the beginning. Her structured four-week eating plan will change the way you feel and the way you live. The Piper Protocol takes you on a journey to make your body, your mind, and your spirit feel better, look better, and

9,99 €

Protocol
Recovery
18 Server Time Protocol Recovery Guide - IBM Redbooks
Auteur : IBM Redbooks
Genre : Ordinateurs
Server Time Protocol (STP) is a server-wide facility that is implemented in the Licensed Internal Code (LIC) of the IBM® zEnterprise EC12 (zEC12), IBM zEnterprise 196 (z196), IBM zEnterprise 114 (z114), IBM System z10™ Enterprise Class (z10 EC), System z10 Business Class (z10 BC), IBM System z9® Enterprise Class (z9 EC), and System z9 Business Class (z9 BC). It provides improved time synchronization in a sysplex or non-sysplex configuration.

This IBM Redbooks® publication will help you plan for and recover from a failure affecting your Mixed or STP-only Coordinated Timing Network. It is intended for technical support personnel requiring information about:

- Recovery concepts and definitions
- Identifying and taking appropriate actions for recovering from a failed component in a Coordinated Timing Network

Readers are expected to be familiar wit

Gratuit

Painless
Autoimmune
Protocol
Recipes
Surprisingly
Digestive
Recipes
19 Painless Autoimmune Paleo Protocol Diet Recipes For Lazy People: 50 Surprisingly Simple AIP Digestive Health Diet Recipes Even Your Lazy Ass Can Make - Phillip Pablo
Auteur : Phillip Pablo
Genre : Régime spécial
Are you on Autoimmune Paleo Protocol Diet and too lazy to cook? This recipes book contains 50 surprisingly simple AIP diet recipes you can prepare and cook on the same afternoon.
In other words, it is so simple, even your lazy ass can cook!
The recipes follow the AIP Diet guidance and they are designed so you can mix and match them according to your preference. Do not think that you have sacrificed your enjoyment of food by giving up meals. Chances are, there are meals you enjoyed eating and you get to stick to the Autoimmune Paleo Protocol Diet plans.
You can substitute them with a variety of appetizers, breakfast, lunches, dinners and desserts recipes. There are ample choices for those who want to stick strictly to AIP Diet. This way, you will never get bored of eating the same meal over and over again. This reinforces your habit of sticking to the diet to a healthier yo

2,99 €

Autoimmune
Protocol
Recipes
20 Paleo Autoimmune Protocol: Paleo Recipes and Meal Plan to Heal Your Body - Dylanna Press
Auteur : Dylanna Press
Genre : Régime spécial
Paleo Autoimmune Protocol (AIP): Paleo Recipes and Meal Plan to Heal Your Body

Everything you need to start the Paleo Autoimmune Protocol. Find out:

*The link between autoimmune disease and diet
*What is a leaky gut and how to tell if you have one
*What is the Paleo Autoimmune Protocol (AIP)
*How to get started on the AIP
*Complete food lists of what to avoid and what to eat while on the AIP
*The best way to reintroduce foods
*FAQs about the Paleo Autoimmune Protocol
* Complete 14-day meal plan
*Over 80 delicious AIP-compliant recipes
*AIP breakfast recipes

This book will help guide you through the process of transforming your diet and regaining control over your health. Contains details about the AIP, its guidelines, and its many benefits. Also included is a meal plan to make it easier to stick to the Autoimmu

4,99 €

Blowback
Protocol
21 The Blowback Protocol - Lars Emmerich
Auteur : Lars Emmerich
Genre : Policier et suspense
A little girl has been slain. Is it Special Agent Sam Jameson’s fault? Homeland, Justice, and a powerful US Senator think so. 

And Sam is afraid they might be right. She’s been suspended, and she even faces an indictment. With her beau stuck on an overseas deployment, she’s left alone with her guilt and heartache — until a cryptic and terrifying message propels her out of her darkness and into a morass of international intrigue. Along the way, the clues start to add up, and Sam begins to wonder:  was the little girl’s tragic death an accident, or something much worse? And what does the CIA have to do with the horrible tragedy?

Halfway across the globe, Sam runs into someone from her past. But something’s different about him, and it quickly becomes clear he’s in a desperate struggle of his own. Three important people in his life have been ki

6,99 €

Protocol
Implementation
22 Server Time Protocol Implementation Guide - Octavian Lascu, Hans-Peter Eckam, George Kozakos & Paulo Vitor Pereira
Auteur : Octavian Lascu, Hans-Peter Eckam, George Kozakos & Paulo Vitor Pereira
Genre : Ordinateurs
Server Time Protocol (STP) is a server-wide facility that is implemented in the Licensed Internal Code (LIC) of IBM® zEnterprise EC12 (zEC12), IBM zEnterprise 196 (z196), IBM zEnterprise 114 (z114), IBM System z10®, and IBM System z9®. It provides improved time synchronization in both a sysplex or non-sysplex configuration.

This IBM Redbooks® publication will help you configure a Mixed Coordinated Timing Network (CTN) or an STP-only CTN. It is intended for technical support personnel requiring information about:

-Installing and configuring a Coordinated Timing Network
-Using STP functions and operations
-Migrating to a Coordinated Timing Network from various timing environments

Readers are expected to be familiar with IBM System z technology and terminology. For planning information, see our companion book, Server Time Protocol Planning G

Gratuit

Competence
23 Competence - Gail Carriger
Auteur : Gail Carriger
Genre : Science-fiction
From New York Times bestselling author Gail Carriger comes the delightful sequel to Imprudence.

Accidentally abandoned!

All alone in Singapore, proper Miss Primrose Tunstell must steal helium to save her airship, the Spotted Custard, in a scheme involving a lovesick werecat and a fake fish tail.

When she uncovers rumors of a new kind of vampire, Prim and the Custard crew embark on a mission to Peru. There, they encounter airship pirates and strange atmospheric phenomena, and are mistaken for representatives of the Spanish Inquisition. Forced into extreme subterfuge (and some rather ridiculous outfits) Prim must also answer three of life's most challenging questions:

Can the perfect book club give a man back his soul?

Will her brother ever stop wearing his idiotic velvet fez?

And can the amount of lard in Christmas pudding

4,99 €

Hashimoto
Pharmacology
24 Hashimoto's Food Pharmacology - Izabella Wentz, PharmD.
Auteur : Izabella Wentz, PharmD.
Genre : Forme et santé
Stay tuned for more information on Hashimoto’s Food Pharmacology, the next book from Izabella Wentz, coming March 2019.

17,99 €

Coronary
Disease
Prevention
25 The Budwig Cancer and Coronary Heart Disease Prevention Diet - Johanna Budwig
Auteur : Johanna Budwig
Genre : Forme et santé
Dr. Johanna Budwig's fi rst work, The Oil-Protein Diet Cookbook has become a staple and integral part of complementary and alternative medicine (CAM) practice worldwide. Now for the fi rst time, it has been updated and expanded with new research and original writings from Dr. Budwig. Dr. Budwig’s famous recipes with her powerful health-promoting ingredients have been successfully employed at clinics worldwide to support the health of cancer and heart-disease patients.

11,99 €

Routing
26 IP Routing on Cisco IOS, IOS XE, and IOS XR - Brad Edgeworth
Auteur : Brad Edgeworth
Genre : Réseau
This is the first single source for mastering all the routing protocols and configurations needed to work with Cisco IOS, IOS XE, and IOS XR operating systems. Bringing together content previously spread across multiple sources and Cisco Press titles, it covers updated standards and features found in enterprise and service provider environments.

IP Routing on Cisco IOS, IOS XE, and IOS XR begins with a brief introduction to each operating system; primers on IP addressing, routing logic, and static routing; and discussions of the routing protocols EIGRP, OSPF, ISIS, and BGP for IPv4 and IPv6. Next, it carefully explains several important advanced topics, including route redistribution, route manipulation, multicast for IPv4 and IPv6, and High Availability (HA)/fast convergence.

All protocols are presented conceptually, with applicable illustrations, configurations, a

48,99 €

Protocol
27 Grail Protocol - Douglas W Jones
Auteur : Douglas W Jones
Genre : Policier et suspense
A thriller book with mystery, adventure, and genetic engineering. Geneticist, Simon Barstow, has stumbled on the secret to immortality

Billionaire Gregory Noble, who has planned decades for precisely this event, orchestrates a ruthless strike to steal this world-changing breakthrough and eliminate the few who know of its existence. His goal—keep the discovery secret and sell eternal life only to those who will both pledge fealty and pay a king's ransom for the privilege.

Barstow has two options, stop the obsessed billionaire, or die. Noble has planned years for every contingency, forcing Barstow to take an insane gamble.

Grail Protocol is Book One of The Grail Protocol Medical Thriller Trilogy, which also includes Grail Awakening, and Grail's End.

PRAISE FOR THE G

Gratuit

Toronto
Protocol
28 The Toronto Protocol - Brian Nugent
Auteur : Brian Nugent
Genre : Droit
This short but explosive text was first leaked by Serge Monast in Canada in 1995. It is reported to be the plan of an elite group who are manipulating the general public and governments across the world to bring about their long term goal of a world government. They cover in this document a wide variety of areas, including world food supplies and pollution, the question of parental rights as opposed to state rights over children, earthquake weapons, the overall media and economic climate which was planned to be favourable in order to lure into complacency the general public, etc etc. Could it be for real? You decide!

3,99 €

Protocol
Planning
29 Server Time Protocol Planning Guide - Octavian Lascu, Hans-Peter Eckam, George Kozakos & Paulo Vitor Pereira
Auteur : Octavian Lascu, Hans-Peter Eckam, George Kozakos & Paulo Vitor Pereira
Genre : Ordinateurs
Server Time Protocol (STP) is a server-wide facility that is implemented in the Licensed Internal Code (LIC) of the IBM® zEnterprise Servers (zEC12, z196 and z114), System z10™ Enterprise Class (z10 EC), System z10 Business Class (z10 BC), IBM System z9® Enterprise Class (z9 EC), System z9 Business Class (z9 BC), and zSeries® z990 and z890 servers. It provides improved time synchronization in a sysplex or non-sysplex configuration.

This IBM Redbooks® publication is intended for infrastructure architects and system programmers who need to understand the IBM STP functions. Readers are expected to be generally familiar with System z® technology and terminology.

This book provides planning information for Server Time Protocol functions and associated software support. For more detailed installation, operation, and recovery information, refer to the companion book

Gratuit

Software
Protocol
Analyzers
Bluetooth
30 Software Protocol Analyzers Reduce Fear of Bluetooth - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
With increased competition for scarcer consumer dollars, manufacturers find themselves scrambling to add features, and one attribute that quickly sets one product above another is wireless capability. Hence, the mad dash to integrate Bluetooth technology into existing hard-wired applications. Greasing the skids for Bluetooth's entry into new territory-both consumer and industrial-is the modern protocol analyzer, now updated to effortlessly examine not only the wireless interface between devices such as a cell phone and a headset, but also the interface between the CPU and the Bluetooth chip inside a device. The advanced capabilities of today's protocol analyzer software help overcome the fear associated with "cutting the umbilical cord" to traditionally hard-wired elements. Companies can now release their newly Bluetooth-enabled products with confidence that the item has been thoroughly

2,99 €

Microsoft
Dynamics
31 Microsoft Dynamics CRM 4.0 Choice of Hotel Group - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
Microsoft Corp. has announced that Choice Hotels International Inc., one of the world's largest hotel franchisors and the company behind such trusted names in lodging as Comfort Inn and Econo Lodge, has selected Microsoft Dynamics CRM 4.0 to automate and integrate its core franchise management operation. Silver Spring, Md.-based Choice Hotels has more than 5,700 franchised hotels, counting more than 460,000 guest rooms across the U.S. and 40 countries and territories. The company has a further 1,096 hotels with more than 89,000 rooms under development.

2,99 €

Gathers
Momentum
32 Sage ERP X3 Gathers Market Momentum - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
Sage ERP X3 has recently been included in the 2010 Magic Quadrant for ERP for Product-Centric Midmarket Companies* addressing the needs of product-centric companies with between 100 and 999 employees, and with annual revenue between US$50 million and US$1 billion. Sage ERP X3 progresses over upper midmarket

2,99 €

Waveform
Technology
Completes
Company
Overview
33 Waveform Technology Completes SAS 70 Data Center Audit (Company Overview) - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
Local colocation provider Waveform Technology, has announced the successful completion of a SAS 70 (Statement on Auditing Standards number 70) audit of Waveform's Troy Michigan Data Center. Godfry Hammel, Danneels & Company, P.C. performed the independent audit, which verified controls concerning data center environmental monitoring, physical security, and system availability. A SAS 70 certification has become standard in the data center industry as a sign of stable uptime, mature data center management, and dependable data security.

2,99 €

Expanded
Verizon
Solutions
Enterprise
Performance
Company
Overview
34 Expanded Verizon Solutions Drive Enterprise Performance (Company Overview) - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
During the second quarter, Verizon Business rolled out significant product enhancements and professional consulting services that enable globally extended enterprises to better perform in these challenging times. The company also continued to enhance its leading global IP network, which serves as the essential platform for integrated, secure global IT and communications solutions. During the quarter, sales of strategic business services -- such as IP, managed services, Ethernet, security solutions and expert professional services -- generated $1.5 billion in revenue, up 3 percent from the second quarter 2008.

2,99 €

Innovative
Storage
Technology
35 CRN Names EMC Vnxe Most Innovative Storage Technology - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
EMC Corporation (NYSE: EMC), Hopkinton, Mass., has announced that the EMC VNXe unified storage solution won CRN's 2011 Tech Innovator award in the storage category. The award honors new products or solutions introduced within the last year that drive advances in technology to the channel. Companies on this exclusive list recently implemented innovative methods to bridge the gap between current challenges and solutions facing channel executives today. The Tech Innovator recognition is the latest in a series of channel-related accolades EMC has received. In August 2011 /CRN/ named EMC "Company of the Year" in three ARC award categories - SMB Network Storage, Enterprise Network Storage and Backup & Recovery Software. This was EMC's first-ever inclusion and recognition in the SMB Network Storage category, a direct result of the VNXelaunch in January and successful channel-centric go-t

2,99 €

Department
Defense
Helmets
36 Review of Department of Defense Test Protocols for Combat Helmets - Committee on Review of Test Protocols Used by the DoD to Test Combat Helmets
Auteur : Committee on Review of Test Protocols Used by the DoD to Test Combat Helmets
Genre : Ingénierie
Combat helmets have evolved considerably over the years from those used in World War I to today's Advanced Combat Helmet. One of the key advances was the development of aramid fibers in the 1960s, which led to today's Kevlar-based helmets. The Department of Defense is continuing to invest in research to improve helmet performance, through better design and materials as well as better manufacturing processes.
Review of the Department of Defense Test Protocols for Combat Helmets considers the technical issues relating to test protocols for military combat helmets. At the request of the DOD Director of Operational Test and Evaluation, this report evaluates the adequacy of the Advanced Combat Helmet test protocol for both first article testing and lot acceptance testing, including its use of the metrics of probability of no penetration and the upper tolerance limit (used to eval

33,99 €

Energizer
Innovation
Partner
Wireless
37 Energizer/Fulton Innovation Partner on Wireless Power - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
Energizer Battery, Inc. has announced it is working with Fulton Innovation, LLC (Fulton) to accelerate development of efficient, intelligent wireless power solutions that can charge portable devices without traditional power cords. As part of the relationship, Energizer is utilizing eCoupled wireless charging, one of a number of enabling technologies that Energizer views as having great potential in addressing consumers' needs for portability and power -- when and wherever they need it.

2,99 €

Telekom
Uninett
38 Aetna, Citi, Telekom Ag and Uninett Win Iddy Awards - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
Liberty Alliance, New York, the global identity community working to build a more trust-worthy Internet for consumers, governments and businesses worldwide, has announced Aetna, Citi, Deutsche Telekom AG and UNINETT have won the 2008 IDDY (Identity Deployment of the Year) Award. This year the judging panel awarded IDDYs in three categories covering Liberty-based deployments, Liberty-based emerging applications and multi-protocol identity-enabled solutions incorporating open identity specifications from Liberty Alliance. Winners will receive the IDDY Award on-stage at CSO Magazine's Digital ID World 2008 conference in Anaheim CA on September 9. A photo of the Liberty Alliance IDDY Award is available at http://www.projectliberty.org/liberty/news_events/iddy_awards "Now in its third year, the Liberty Alliance IDDY Awards recognize some of the best-of-the-best enterprise and user-driven iden

2,99 €

Adventure
Peculiar
39 The Adventure of the Peculiar Protocols - Nicholas Meyer
Auteur : Nicholas Meyer
Genre : Polars britanniques
With the international bestseller The Seven-Per-Cent Solution, Nicholas Meyer brought to light a previously unpublished case of Sherlock Holmes, as recorded by Dr. John H. Watson. Now Meyer returns with a shocking discovery—an unknown case drawn from a recently unearthed Watson journal.

January 1905: Holmes and Watson are summoned by Holmes' brother Mycroft to undertake a clandestine investigation. An agent of the British Secret Service has been found floating in the Thames, carrying a manuscript smuggled into England at the cost of her life. The pages purport to be the minutes of a meeting of a secret group intent on nothing less than taking over the world.

Based on real events, the adventure takes the famed duo—in the company of a bewitching woman—aboard the Orient Express from Paris into the heart of Tsarist Russia, where Holmes and Watson attempt to


Arrives
Memphis
Metropolitan
40 AT&T U-Verse Arrives in Memphis Metropolitan Area - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
Memphis residents now have a new choice for their television and communications services, powered by the most advanced technology. AT&T* has announced the launch of AT&T U-verse(SM) services in parts of the Memphis metropolitan area, including AT&T U-verse TV, AT&T U-verse High Speed Internet and AT&T U-verse Voice. AT&T U-verse services, which are all delivered over AT&T's advanced Internet Protocol (IP) network, offer a new alternative to cable and an unmatched experience for customers. AT&T U-verse brings together your U-verse TV, U-verse Internet, U-verse Voice and AT&T wireless services - all on one bill - with unique features that provide a new level of integration, convenience and control. AT&T U-verse TV ranked "Highest in Customer Satisfaction in the South Region," according to the J.D. Power and Associates 2008 Residential Television S

2,99 €

Provides
Platform
Communications
Technology
41 Vox Provides Voip Platform and Video Communications Technology Update - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
Pervasip Corp. (OTCQB: PVSP) has announced that its wholly owned subsidiary, VoX Communications, a leading provider of wholesale Voice over Internet Protocol (VoIP) cloud-based telephony solutions, has developed and deployed several video technology additions to its award winning VoIP technology platform. Pervasip's Chief Information Officer, Mark Richards, noted, "We continue to use our expertise in cloud-based telephony and VoIP to bring exciting and innovative features to our products and platform. Already in 2011 we have developed significant video capabilities to our technology and we are excited to share this progress with our shareholders."

2,99 €

Brocade
Unveils
Brocade
Backbone
Network
42 Brocade Unveils Brocade DCX Backbone for Data Center Network - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
Brocade(R) (NASDAQ:BRCD), San Jose, Calif., a leading provider of data center networking solutions that help enterprises connect and manage their information, has introduced the Brocade DCX(TM) Backbone, the first in a new class of high- performance data center networking products designed to address the demanding requirements of the evolving data center. Built on four generations of proven data center technology and designed to integrate seamlessly with existing Brocade products -- including existing McDATA solutions -- the Brocade DCX provides industry breakthroughs in terms of performance, scalability, and efficiency. As a result, customers can use the Brocade DCX to build data center fabrics that enable extremely high levels of consolidation and cost savings along with lower deployment and operational risk.

2,99 €

Beating
Transplantation
43 Non-Heart-Beating Organ Transplantation - Committee on Non-Heart-Beating Transplantation II: The Scientific and Ethical Basis for Practice and Protocols
Auteur : Committee on Non-Heart-Beating Transplantation II: The Scientific and Ethical Basis for Practice and Protocols
Genre : Médecine
In 1997, the Institute of Medicine published a report entitled Non-Heart- Beating Organ Transplantation: Medical and Ethical Issues in Procurement. The findings and recommendations of that study defined the ethical and scientific basis for non-heart-beating organ donation and transplantation, and provided specific recommendations for practices that affirm patient welfare, promote patient and family choice, and avoid conflicts of interest.

Following the 1997 study, the Department of Health and Human Services requested a follow up study to promote such efforts. The central activity for this study was a workshop held in Washington, D.C., on May 24-25, 1999. The workshop provided the opportunity for extensive dialogue on non-heart-beating organ donation among hospitals and organ procurement organizations (OPOs) that are actively involved in non-heartbeating organ and tissue donat

36,99 €

Unveils
Document
Workflow
44 Ricoh Unveils Aficio MFP Document Workflow System - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
Ricoh Americas Corporation, West Caldwell, N.J., a leading provider of digital office equipment, has announced its new Aficio(R) MP 6001/MP 7001/MP 8001/MP 9001 Series of black-and-white multifunction products (MFPs). Intended for large, high-volume workgroups, the devices combine speed and quality to ensure top-notch productivity and performance. As a result, the Aficio MP 6001/MP 7001/MP 8001/MP 9001 devices are among the most competitive, technologically advanced high-volume MFPs on the market. The series also features an array of advanced functionalities, comprehensive security capabilities and professional finishing options to efficiently manage every aspect of the document workflow from input to management and output. The Aficio MP 6001/MP 7001/MP 8001/MP 9001 Series provides exceptional value to customers via faster print speeds, quick warm-up times and larger paper tray capaci

2,99 €

Synchronica
Launches
Messagephones
45 Synchronica Launches First Low-Cost Messagephones - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
Synchronica plc, the international provider of next generation mobile messaging services, and Korean Device Manufacturer KC Mobile have introduced MessagePhone(TM), a new low-cost messaging device (http://www.message-phone.com). The result of eight months of extensive collaboration, the new MessagePhone provides an integrated device and service solution that delivers Smartphone-like functionality and messaging services at lower TCO than competing solutions. MessagePhone enables operators in emerging markets to bring mobile data services to the mass market and to combat churn. MessagePhone, which is available in two models, is distributed by Brightstar, a multi-billion dollar global innovator in demand generation distribution and integrated supply chain solutions in the converging wireless and IT industries.

2,99 €

Storage
Networking
Security
Management
46 EMC Debuts New Storage Networking Security/Management - Computer Protocols
Auteur : Computer Protocols
Genre : Entreprise et management
EMC Corporation (NYSE:EMC), Hopkinton, Mass., a world leader in information infrastructure solutions, has introduced the newest addition to its EMC(R) Connectrix(R) family of switches and directors as well as new storage networking security and management capabilities. The EMC Connectrix ED-DCX-4S-B, a new midsize backbone director, based on OEM technology from Brocade, is a multipurpose core and edge network switching platform designed to help facilitate server, storage area network (SAN), and data center consolidation while helping to reduce IT infrastructure and administrative costs. The director scales to 192 ports at up to full 8 Gbit/sec speed through its four modular blade slots and leverages the same architecture and delivers the same high levels of performance, scalability, and energy efficiency as its larger predecessor, the Connectrix DCX director.

2,99 €

Recommendation
National
Standard
Tactical
Emergency
Casualty
Israeli
Hospital
Shooter
Terrorist
Attacks
Protocol
Deficiencies
47 Recommendation for a National Standard for Tactical Emergency Casualty Care and Israeli Hospital Trauma Protocols in the United States: Active Shooter and Terrorist Attacks, EMS Protocol Deficiencies - David N. Spires
Auteur : David N. Spires
Genre : Médecine
Professionally converted for accurate flowing-text e-book format reproduction, this report asks the following question: Why are tactical emergency casualty care (TECC) rescue task force (RTF) and Israeli hospital trauma programs the best approaches to addressing the current gaps and weaknesses in trauma management in the United States in the context of terrorist attacks and/or active shooter incidents?

The purpose of this thesis is to ascertain why existing tactical emergency medical service protocols in most public safety jurisdictions are deficient and to analyze which types of resources jurisdictions need in order to ensure that they have optimal programs in place for mass casualty incident response.

Active shooter and terrorist attacks have been on the rise since the 1990s. This thesis found that most public safety organizations in the United States are unprepar

9,49 €

Convention
Concerning
Maritime
Navigation
Protocol
Concerning
Platforms
Continental
48 Protocols of 2005 to the Convention concerning Safety of Maritime Navigation and to the Protocol concerning Safety of Fixed Platforms on the Continental Shelf (United States Treaty) - The Law Library
Auteur : The Law Library
Genre : Droit
The Law Library presents the complete text of the Protocols of 2005 to the Convention concerning Safety of Maritime Navigation and to the Protocol concerning Safety of Fixed Platforms on the Continental Shelf (United States Treaty)
Updated as of 01/10/19

This ebook contains:
- The complete text of the Protocols of 2005 to the Convention concerning Safety of Maritime Navigation and to the Protocol concerning Safety of Fixed Platforms on the Continental Shelf (United States Treaty)
- A dynamic table of content linking to each section
- A table of contents in introduction presenting a general overview of the structure

9,99 €

Mystery
Conspiracy
49 Mystery & Conspiracy: Protocols of the Elders of Zion - iMinds
Auteur : iMinds
Genre : Outils pédagogiques
Learn the story of the Protocols of the Elders of Zion with iMinds insightful knowledge series. 

The Protocols of the Elders of Zion is the one of the world's most famous conspiracy theories.  It is a statement of prejudice and paranoia, a fake historical record and a grand hoax all rolled into one.
The Protocols claim to prove that there is a Jewish plot to take over the world and purport to show that socialism, liberalism and every other reformist idea or activity are just tools of a Jewish secret cabal.   The Protocols have been discredited many times over their 110-year-old history and would be laughable, except for the tragic role they played in the Twentieth Century.

iMinds brings targeted knowledge to your iPad with short information segments  to whet your mental appetite and broaden your mind.

0,49 €

Learned
50 The Protocols of the Learned Elders of Zion - Sergei Nilus
Auteur : Sergei Nilus
Genre : Politique et actualité
ORIGINAL , UNABRIDGED VERSION
Truth or hoax... read and decide by yourself...
When the Protocols of the Learned Elders of Zion were first discovered, Freemasons and Zionist Jews everywhere screamed and complained that these 24 Protocols are a hoax, a forgery, even a blood taint against the Jews. But then came the brutal and barbaric Communist Bolshevik Revolution in Russia and its captive republics, led by covert Masonic Jews Lenin, Trotsky, Kaganovich, and others. The cruel and sinister crimes of the crypto-Jew revolutionaries seemed to have jumped off the pages of the Protocols. The Red Terror, with its torturous massacres of innocent people, its monstrous gulag concentration camps, and the setting up of a Jewish dictatorship, also followed the agenda of the Protocols as did the persecution everywhere of Christians and churches. The entire world witnessed horrors that were

0,99 €
Pas de Suggestions Relatives pour: Protocols