|
|
|
|
Inside the Security Mind: Making the Tough DecisionsOrganizations today commit ever-increasing resources to information security, but are scarcely more secure than they were four or five years ago! By treating information security like an ordinary technological practice—that is, by throwing money, a handful of the latest technologies, and a lineup of gurus at the problem—they... | | Sakai Courseware Management: The Official GuideThis book is the officially endorsed Sakai guide. From setting up and running Sakai for the first time to creatively using its tools, this book delivers everything you need to know.
Written by Alan Berg, Senior developer at the IC and a Sakai fellow and Michael Korcuska, the executive director of the Sakai Foundation, and with... | | Rehab Notes: A Clinical Examination Pocket Guide (Davis Notes)
This innovative, easy-to-access, pocket guide of essential assessment and treatment information is the ideal patient-side tool for students and rehabilitation clinicians. It s chocked full of critical information that you are unlikely to memorize, but always need close at hand when treating patients. ... |
|
|
Business performance Intelligence Software: A Market EvaluationThis report aims to help executives identify Business Performance Intelligence (BPI) software best suited to their organizations’ objectives. It provides an overview of the increasingly complex BPI market (which includes 1) strategy development/execution & performance management, 2) planning, budgeting & forecasting, and 3) business... | | Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of ... | | Web Application Vulnerabilities: Detect, Exploit, PreventThis book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,... |
|
|
|
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 |