Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.

Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the...

Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Digital Accounting: The Effects of the Internet And Erp on Accounting
Digital Accounting: The Effects of the Internet And Erp on Accounting
Digital Accounting: The Effects of the Internet and ERP on Accounting provides a foundation in digital accounting by covering fundamental topics such as accounting software, XBRL (eXtensible Business Reporting Language), and EDI. The effects of the Internet and ERP on accounting are classified and presented for each accounting cycle, along with a...
DB2 Universal Database for OS/390 Version 7.1 Certification Guide
DB2 Universal Database for OS/390 Version 7.1 Certification Guide
IBM's DB2 Universal Database Version 7.1 for OS/390 delivers unparalleled performance, scalability, and reliability in today's enterprise e-business environments! Now, there's a complete, authoritative guide to deploying, managing, and developing applications with DB2 UDB V7.1 in both OS/390 and z/OS environments—and preparing for IBM's...
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
The Audit Committee Handbook
The Audit Committee Handbook
Since the publication of the third edition of The Audit Committee Handbook in
1999, a number of major accounting scandals (e.g., Enron,WorldCom, and others)
as well as the demise of the international accounting firm of Anderson LLP have
shaken the global capital markets. As a result, the U.S. Congress enacted the Sarbanes-
Oxley
...
Windows Vista Administration: The Definitive Guide
Windows Vista Administration: The Definitive Guide
Whether you're a system administrator responsible for hundreds of Windows clients, or a just a roomful of computers, this book will help you install, configure, and maintain Microsoft's newest OS. Written in jargon-free English that puts concepts in proper context, the book gives you a better understanding of Vista's innovations and capabilities,...
Practical Hadoop Security
Practical Hadoop Security

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive...

Just Enough CRM
Just Enough CRM

The decision-maker's guide to competitive advantage with CRM

  • Getting real benefits from CRM--fast

  • A complete roadmap for auditing and

  • improving your current CRM processes

  • ...
The International Handbook of Computer Security
The International Handbook of Computer Security
This book is a one-stop resource to help executives and computer professionals protect their systems and data from a myriad of internal and external threats. Addressing a wide range of security issues, it provides practical guidance on topics such as: physical security procedures * data preservation and protection * hardware and software protection...
Surgical Complications: Diagnosis and Treatment
Surgical Complications: Diagnosis and Treatment

As Professor Owen H Wangensteen, one of the greatest academic surgeons of the 20th century, said: You are a true surgeon from the moment you are able to deal with your complications. Prompt and accurate diagnosis, as well as effective treatment, of surgical complications is one of the most important elements of surgical practice. This is...

Preventing Good People From Doing Bad Things: Implementing Least Privilege
Preventing Good People From Doing Bad Things: Implementing Least Privilege

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy