Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Telemedicine: A Computing and Networking Perspective
Mobile Telemedicine: A Computing and Networking Perspective
Wireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has...
Strategic Data Warehousing: Achieving Alignment with Business
Strategic Data Warehousing: Achieving Alignment with Business
Strategic Data Warehousing: Achieving Alignment with Business provides an integrated approach to achieving successful and sustainable alignment of data warehouses and business goals. It details the roles and responsibilities of the data warehouse and business managers in achieving strategic alignment, technical integration, and...
Strategic Information Security
Strategic Information Security

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies....

Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

Digital Privacy: Theory, Technologies, and Practices
Digital Privacy: Theory, Technologies, and Practices
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy:...
Manage Software Testing
Manage Software Testing
…a comprehensive, practical cookbook of software testing with a slight mix of quality spices. …the book is a step-by-step guide of how to perform testing. It is practically focused and, in many of the chapters, the reader can follow the tasks (as if they were recipes) when performing testing activities.
-Software Testing,
...
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)

Database Design Using Entity-Relationship Diagrams clarifies ER diagram design by defining it in terms of requirements (end user requests) and specifications (designer feedback to that request). The book emphasizes how communication between designers and users during design is crucial for the elicitation of targeted data, and for the creation of...

Applied Software Risk Management: A Guide for Software Project Managers
Applied Software Risk Management: A Guide for Software Project Managers
Few software projects are completed on time, on budget, and to their original specification. Research supports that projects usually fail due to management, rather than technical, mistakes. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software...
Investigator's Guide to Steganography
Investigator's Guide to Steganography

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable...

Design and Implementation of Data Mining Tools
Design and Implementation of Data Mining Tools

Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors’ own research work, the book takes a practical approach to the...

Information Security Management Handbook, Fifth Edition
Information Security Management Handbook, Fifth Edition

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated...

Antipatterns: Identification, Refactoring, and Management
Antipatterns: Identification, Refactoring, and Management
AntiPatterns: Identification, Refactoring, and Management catalogs 48 bad management practices and environments common to software development, IT, and other organizations. The authors cover antipatterns of management, along with environmental/cultural antipatterns and personality antipatterns/phenotypes. Through the classification of these harmful...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy