Governance, Risk, and Compliance Handbook for Oracle Applications
Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
Canon Speedlite System Digital Field Guide
Welcome to the new Wiley Digital Field Guide for the Canon Speedlite System.
Whether you are holding this book or your new Canon Speedlite in your hands,
you are holding a fantastic tool that will assist you in creating awesome photographs
that you will be proud to display and share with your family and friends. Much has
SSL Remote Access VPNs (Networking Technology: Security) This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,...
The Black Art of Xbox Mods The Xbox might be described as a powerful, proprietary PC that has been customized exclusively for running games. This book will help you to maximize the potential of your Xbox video game console by showing you how to modify your Xbox in various ways. You will learn how to disassemble your Xbox, right down to the motherboard, and you will... Learning Ext JS 3.2
The book provides plenty of fun example code and screenshots to guide you through the creation of examples to assist with learning. By taking a chapter-by-chapter look at each major aspect of the Ext JS framework, the book lets you digest the available features in small, easily understandable chunks, allowing you to start using the library...
Software Engineering: A Practitioner's Approach
When computer software succeeds—when it meets the needs of the people who use
it, when it performs flawlessly over a long period of time, when it is easy to modify
and even easier to use—it can and does change things for the better. But when software
fails—when its users are dissatisfied, when it is error prone, when...
|Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |