Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Oracle Internals: Tips, Tricks, and Techniques for DBAs
Oracle Internals: Tips, Tricks, and Techniques for DBAs

If you are a typical Oracle professional, you don't have the luxury of time to keep up with new technology and read all the new manuals to understand each new feature of each release of Oracle. You need a comprehensive source of information and techniques for using the new technology. You need Oracle Internals: Tips, Tricks, and...

Wi-Fi Enabled Healthcare
Wi-Fi Enabled Healthcare

Focusing on its recent proliferation in hospital systems, Wi-Fi Enabled Healthcare explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on first-hand experiences from one of the largest healthcare systems in the United States, it...

The Art of Agile Practice: A Composite Approach for Projects and Organizations (Advanced & Emerging Communications Technologies)
The Art of Agile Practice: A Composite Approach for Projects and Organizations (Advanced & Emerging Communications Technologies)

The Art of Agile Practice: A Composite Approach for Projects and Organizations presents a consistent, integrated, and strategic approach to achieving "Agility" in your business. Transcending beyond Agile as a software development method, it covers the gamut of methods in an organization?including...

The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which today's Internet of People gives way to tomorrow's Internet of Things where billions of...
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Interest in Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) recently exploded globally in both industry and academia, but security is one of the key issues standing in the way of broad deployment of RFID and WSN systems. Broken down into easily navigable parts, this cutting-edge book offers a comprehensive discussion on...
Building and Maintaining a Data Warehouse
Building and Maintaining a Data Warehouse
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. While it may be easy to plan for a data warehouse that incorporates all the right concepts, taking the steps needed to create a warehouse that is as functional and user-friendly as it is...
RFID in the Supply Chain: A Guide to Selection and Implementation (Resource Management)
RFID in the Supply Chain: A Guide to Selection and Implementation (Resource Management)
It was the publisher’s idea that I write RFID in the Supply Chain: A Guide to Selection and Implementation . Not only am I editor of Enterprise Integration System, Second Edition Handbook and author of The Complete Book of Middleware, I also had some innovative business process and project management ideas on improving the effectiveness of...
Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is...

Strategic Data Warehousing: Achieving Alignment with Business
Strategic Data Warehousing: Achieving Alignment with Business
Strategic Data Warehousing: Achieving Alignment with Business provides an integrated approach to achieving successful and sustainable alignment of data warehouses and business goals. It details the roles and responsibilities of the data warehouse and business managers in achieving strategic alignment, technical integration, and...
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy