Home | Amazing | Today | Tags | Publishers | Years | Search 
The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)
The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)

In the current fast-paced and constantly changing business environment, it is more important than ever for organizations to be agile, monitor business performance, and meet with increasingly stringent compliance requirements. Written by pioneering consultants and bestselling authors with track records of international success, The...

Information Security Architecture: An Integrated Approach to Security in the Organization
Information Security Architecture: An Integrated Approach to Security in the Organization

This book is dedicated to my husband, Todd A. Tudor, and my three children, Drew, Allyssa, and Chad, who spent many hours patiently waiting for my time and attention while this book was being written.

Profits from this book will be contributed to the children of the world through the YMCA in Ethiopia, Africa, and through The...

Cyber Security Essentials
Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...

Software Testing and Continuous Quality Improvement, Third Edition
Software Testing and Continuous Quality Improvement, Third Edition

Numerous textbooks address software testing in a structured development environment. By “structured” is meant a well-defined development cycle in which discretely defined steps provide measurable outputs at each step. It is assumed that software testing activities are based on clearly defined requirements and software...

Knowledge Management and E-Learning
Knowledge Management and E-Learning

This work embraces two heretofore distinct fields of study, knowledge management and e-learning. In order to understand the impetus to link these two fields by a common thread, it is necessary to understand the two fields and the focus of each.

Knowledge management (KM) has developed as a field from its roots in data and...

Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Applied Semantic Web Technologies
Applied Semantic Web Technologies
Since Tim Berners-Lee’s original idea for a global system of interlinked hypertext documents from 1989, the World Wide Web has grown into the world’s biggest pool of human knowledge. Over the past few years, the Web has changed the way people communicate and exchange information. It has created new business...
Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. Written as a contribution to the accounting and auditing...

Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Cloud and Virtual Data Storage Networking
Cloud and Virtual Data Storage Networking
Since I wrote The Green and Virtual Data Center (CRC Press, 2009), I have had the opportunity to meet and speak with thousands of information technology (IT) professionals around the world, both in person and virtually via different venues. Even as that last book was being printed, the ideas to be found in this new book were coming...
Practical Project Management for Building and Construction (ESI International Project Management Series)
Practical Project Management for Building and Construction (ESI International Project Management Series)

Practical Project Management for Building and Construction covers the 14 knowledge areas of project management that are essential for successful projects in the construction industry. For each knowledge area, it explains the processes for scope, time, risk, cost, and resource management. Filled with work and process flow...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy