Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The HIPAA Program Reference Handbook
The HIPAA Program Reference Handbook
Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them the ramifications of HIPAA. Until now. The HIPAA...
Architectures for E-Business Systems: Building the Foundation for Tomorrow's Success
Architectures for E-Business Systems: Building the Foundation for Tomorrow's Success
As dot.com companies grapple with rigid market conditions and we keep hearing how the big technology players are being punished on Wall Street, it becomes easy to think of the Internet as a fad. The Internet frenzy may have subsided, but interest in the Internet as a business and marketing tool is still strong. It will continue to impact...
Web-to-Host Connectivity
Web-to-Host Connectivity
Nobody can dispute the incredible impact that the Web continues to have on the way in which people work, shop, research, play, and communicate. In the span of just a few short years, enterprises in nearly every industry and market have had to reevaluate the way in which they do business with their business partners and end customers. Having a...
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which today's Internet of People gives way to tomorrow's Internet of Things where billions of...
X Internet: The Executable and Extendable Internet
X Internet: The Executable and Extendable Internet
Evolving from the current PSTN to Internet Telephony is not an easy task. … The two authors [of this book] are uniquely qualified to explain how this evolution can be architected. … Both authors have used their unique expertise to produce this very first book on the topic.
-From the Foreword by Roch Glitho, Ph.D.,
...
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts...
Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Recent advancement and increased growth in Web technologies have resulted in an even greater need for more efficient scheduling and data transmission strategies. An increased reliance on wireless communications devices, with their constraint issues, has further complicated the problem. While both push and pull strategies provide certain solutions,...
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
An identity management system is defined as the management of the identity life cycle of entities (subjects or objects) during which the identity is established, described, and destroyed. What this definition fails to cover is the social, personal, and financial impact of the identity life cycle.

Before I joined Oracle as director of GRC
...
High-Speed Cisco Networks: Planning, Design, and Implementation
High-Speed Cisco Networks: Planning, Design, and Implementation
Cisco's routers, hubs, and switches are the core of both the Internet and today's high-speed networks. To make sure you design the right high-speed network for your needs, you need High-Speed Cisco Networks. This book shows you how to: o Sell advanced LAN/WAN technology and its benefits to upper management o Make your department more productive...
IS Management Handbook, 8th Edition
IS Management Handbook, 8th Edition
The first few years of the new millennium have been a challenging time for the information technology (IT) manager. The initial economic euphoria that greeted the successful completion of Y2K projects worldwide was quickly followed by a dramatic shakedown within U.S.-based industries most closely related to the growth of the Internet. Today,...
Carrier Ethernet: Providing the Need for Speed
Carrier Ethernet: Providing the Need for Speed
Facilitating high data transfers over long distances at a reasonable cost, Carrier Ethernet is solidifying its fundamental position as the core of next-generation networks. Since it first dazzled the IT world 40 years ago with its ability to move data over local networks, Ethernet has dramatically evolved in both form and function. And now, Carrier...
Broadband Mobile Multimedia: Techniques and Applications (Wireless Networks and Mobile Communications)
Broadband Mobile Multimedia: Techniques and Applications (Wireless Networks and Mobile Communications)
Multimedia service provisioning is believed to be one of the prerequisites to guarantee the success of next-generation wireless networks. Examining the role of multimedia in state-of-the-art wireless systems and networks, Broadband Mobile Multimedia: Techniques and Applications presents a collection of introductory concepts,...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy