Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Structured Finance Modeling with Object-Oriented VBA (Wiley Finance)
Structured Finance Modeling with Object-Oriented VBA (Wiley Finance)
Praise for STRUCTURED FINANCE MODELING with Object-Oriented VBA

"This book is an excellent and interesting integration of financial engineering, structured finance, and structured programming, and the book accomplishes this with easy-to-follow examples, using the most commonly available tools, MS VBA and spreadsheets. The author is clearly...

Risk Management and Capital Adequacy
Risk Management and Capital Adequacy

A Step-by-Step Approach for Integrating Market, Credit, and Operational Risk Management--While Complying with New Basel Accord Guidelines

For financial institutions around the world, the work involved in managing market, credit, and operational risk exposures--as well as the capital required to support such...

Programming MapPoint in .NET
Programming MapPoint in .NET

Interactive web maps generated by MapPoint-Microsoft's popular mapping technology are crucial for businesses in a number of fields, including real estate, package delivery, and commercial air travel. In a word, MapPoint provides businesses with "location." Specifically, it provides an integrated set of products,...

Trading ETFs: Gaining an Edge with Technical Analysis
Trading ETFs: Gaining an Edge with Technical Analysis

A comprehensive catalog of exchange-traded funds and insights into successful trading techniques

This Second Edition of the bestselling Trading ETFs offers an updated version of the definitive guide to this vital part of the capital markets. It contains numerous new examples of the techniques that author Deron...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Engineering and Managing Software Requirements
Engineering and Managing Software Requirements
Requirements engineering is the process by which the requirements for software systems are gathered, analyzed, documented, and managed throughout their complete lifecycle. Traditionally it has been concerned with technical goals for, functions of, and constraints on software systems. Aurum and Wohlin, however, argue that it is no longer appropriate...
Programming iOS 10: Dive Deep into Views, View Controllers, and Frameworks
Programming iOS 10: Dive Deep into Views, View Controllers, and Frameworks

If you’re grounded in the basics of Swift, Xcode, and the Cocoa framework, this book provides a structured explanation of all essential real-world iOS app components. Through deep exploration and copious code examples, you’ll learn how to create views, manipulate view controllers, and add features from iOS frameworks.

...
Rails, Angular, Postgres, and Bootstrap: Powerful, Effective, and Efficient Full-Stack Web Development
Rails, Angular, Postgres, and Bootstrap: Powerful, Effective, and Efficient Full-Stack Web Development

As a Rails developer, you care about user experience and performance, but you also want simple and maintainable code. Achieve all that by embracing the full stack of web development, from styling with Bootstrap, building an interactive user interface with AngularJS, to storing data quickly and reliably in PostgreSQL. Take a holistic view of...

Electric Power Planning for Regulated and Deregulated Markets
Electric Power Planning for Regulated and Deregulated Markets

As the industry environment transforms from a completely regulated setting to a broader, deregulated marketplace, new market participants must understand planning and operations of power systems to effectively participate in markets.  This industry overview provides a description of utility operations and traditional planning, and then...

Data Warehousing For Dummies (Computer/Tech)
Data Warehousing For Dummies (Computer/Tech)
Data warehousing is one of the hottest business topics, and there’s more to understanding data warehousing technologies than you might think. Find out the basics of data warehousing and how it facilitates data mining and business intelligence with Data Warehousing For Dummies, 2nd Edition.

Data is probably your...

SAP PS FAQ: SAP Project Systems Interview Questions, Answers, and Explanations
SAP PS FAQ: SAP Project Systems Interview Questions, Answers, and Explanations
The Ultimate Reference & Learning Guide for S A P PS Consultants SAP PS Questions, Answers, and Explanations! It' s clear that SAP PS is the future for projects activity in SAP -- but finding resources can be difficult . SAP PS Interview Questions, Answers, and Explanations guides you through your learning process. From helping you to...
unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy