Home | Amazing | Today | Tags | Publishers | Years | Search 
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

Implement an Effective Security Metrics Project or Program

IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the...

Audience, Relevance, and Search: Targeting Web Audiences with Relevant Content
Audience, Relevance, and Search: Targeting Web Audiences with Relevant Content

How much more effective would companies be if all the content they created for the Web reached its specific target audience? In this book, three pioneering IBM content and search experts show how to get closer to this goal than ever before. Readers will discover how to write highly relevant content containing the keywords and long-tail...

Trading from Your Gut: How to Use Right Brain Instinct & Left Brain Smarts to Become a Master Trader
Trading from Your Gut: How to Use Right Brain Instinct & Left Brain Smarts to Become a Master Trader

EARN SERIOUS TRADING PROFITS BY USING YOUR WHOLE BRAIN!

 

Legendary traders like Jesse Livermore, George Soros, Richard Dennis, and Steven Cohen use their full range of powers that encompass both instinct and analysis. That’s how they made...

Silverlight 4 Business Intelligence Software
Silverlight 4 Business Intelligence Software

Business Intelligence (BI) software allows you to view different components of a business using a single visual platform, which makes comprehending mountains of data easier. BI is everywhere. Applications that include reports, analytics, statistics, and historical and predictive modeling are all examples of BI. Currently, we are in the second...

Microarray Image Analysis: An Algorithmic Approach
Microarray Image Analysis: An Algorithmic Approach

To harness the high-throughput potential of DNA microarray technology, it is crucial that the analysis stages of the process are decoupled from the requirements of operator assistance. Microarray Image Analysis: An Algorithmic Approach presents an automatic system for microarray image processing to make this...

Information-Driven Business: How to Manage Data and Information for Maximum Advantage
Information-Driven Business: How to Manage Data and Information for Maximum Advantage

Information doesn't just provide a window on the business, increasingly it is the business. The global economy is moving from products to services which are described almost entirely electronically. Even those businesses that are traditionally associated with making things are less concerned with managing the manufacturing process (which...

Liquid Chromatography - Mass Spectrometry: An Introduction (Analytical Techniques in the Sciences
Liquid Chromatography - Mass Spectrometry: An Introduction (Analytical Techniques in the Sciences

First explaining the basic principles of liquid chromatography and mass spectrometry and then discussing the current applications and practical benefits of LC-MS, along with descriptions of the basic instrumentation, this title will prove to be the indispensable reference source for everyone wishing to use this increasingly important tandem...

Advanced Techniques in RF Power Amplifier Design
Advanced Techniques in RF Power Amplifier Design

An invaluable reference tool for RF, digital and system level designers, the book enable you to efficiently design linear RF power amplifiers, and includes detailed discussions on envelope power management schemes and linearization techniques.

First of all, I should explain the title of this book. This is not really an advanced...

Adaptive Digital Filters (Signal Processing and Communications)
Adaptive Digital Filters (Signal Processing and Communications)

This text emphasizes the intricate relationship between adaptive filtering and signal analysis - highlighting stochastic processes, signal representations and properties, analytical tools, and implementation methods. This second edition includes new chapters on adaptive techniques in communications and rotation-based algorithms. It provides...

Human-Computer Interaction and Operators Performance: Optimizing Work Design with Activity Theory
Human-Computer Interaction and Operators Performance: Optimizing Work Design with Activity Theory

A collection of works authored by leading scientists from the US and Russia, Human-Computer Interaction and Operators’ Performance: Optimizing Work Design with Activity Theory describes applied and systemic-structural activity theory as it is used to study human-computer interaction, aviation, design, and training....

Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach

Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of...

Practical Studies in E-Government: Best Practices from Around the World
Practical Studies in E-Government: Best Practices from Around the World

Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights...

Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy