Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Agile Practice: A Composite Approach for Projects and Organizations (Advanced & Emerging Communications Technologies)
The Art of Agile Practice: A Composite Approach for Projects and Organizations (Advanced & Emerging Communications Technologies)

The Art of Agile Practice: A Composite Approach for Projects and Organizations presents a consistent, integrated, and strategic approach to achieving "Agility" in your business. Transcending beyond Agile as a software development method, it covers the gamut of methods in an organization?including...

A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Modeling Software with Finite State Machines: A Practical Approach
Modeling Software with Finite State Machines: A Practical Approach
This book discusses a topic that is among the central questions of software development. Therefore, we must position ourselves in that area to justify our right to express our opinion on that topic. Saying “we” implies at least one person in the co-author group. We have worked for several years in software development using various...
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)

Essential to database design, entity-relationship (ER) diagrams are known for their usefulness in mapping out clear database designs. They are also well-known for being difficult to master. With Database Design Using Entity-Relationship Diagrams, Second Edition, database designers, developers, and students preparing...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Software Engineering Reviews and Audits
Software Engineering Reviews and Audits

I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in...

PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)
PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)

PMP® Exam: Practice Test and Study Guide, Ninth Edition uses self-study to help readers increase their chances of passing the PMP certification exam the first time. This spiral-bound edition includes 40 multiple-choice practice questions in each of the ten knowledge areas and in the...

Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

Real Process Improvement Using the CMMI
Real Process Improvement Using the CMMI
This book offers non-academic, real-world approaches to implementing CMMI-based process improvement in an organization. The author identifies critical concepts of CMMI, and details how to turn them into real process improvement.

Real Process Improvement Using the CMMI provides real-world concepts and techniques for CMMI-based...

Practical Project Management for Building and Construction (ESI International Project Management Series)
Practical Project Management for Building and Construction (ESI International Project Management Series)

Practical Project Management for Building and Construction covers the 14 knowledge areas of project management that are essential for successful projects in the construction industry. For each knowledge area, it explains the processes for scope, time, risk, cost, and resource management. Filled with work and process flow...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy