Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

The Price of Prosperity: A Realistic Appraisal of the Future of Our National Economy (Peter L. Bernstein's Finance Classics)
The Price of Prosperity: A Realistic Appraisal of the Future of Our National Economy (Peter L. Bernstein's Finance Classics)
One of the foremost financial writers of his generation, Peter Bernstein has the unique ability to synthesize intellectual history and economics with the theory and practice of investment management. Now, with classic titles such as Economist on Wall Street, A Primer on Money, Banking, and Gold, and The Price of Prosperitywhich have...
Building Digital Experience Platforms: A Guide to Developing Next-Generation Enterprise Applications
Building Digital Experience Platforms: A Guide to Developing Next-Generation Enterprise Applications

Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise platform.

In this book the authors examine...

Software Modeling and Design: UML, Use Cases, Patterns, and Software Architectures
Software Modeling and Design: UML, Use Cases, Patterns, and Software Architectures

This book describes a use case–driven UML-based method for the modeling and design of software architectures, including object-oriented software architectures, client/server software architectures, service-oriented architectures, componentbased software architectures, concurrent and real-time software architectures, and software...

Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

Java Program Design: Principles, Polymorphism, and Patterns
Java Program Design: Principles, Polymorphism, and Patterns
Get a grounding in polymorphism and other fundamental aspects of object-oriented program design and implementation, and learn a subset of design patterns that any practicing Java professional simply must know in today’s job climate. 

Java Program Design presents program design...
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
Software by Design: Shaping Technology and The Workplace
Software by Design: Shaping Technology and The Workplace
As computers become more and more integral to business and other organizational operations around the world, software design must increasingly meet the social demands of the workplace. This book provides an informative, cogent examination of how various social factors--such as organizational structure, workplace relations, and market...
Human Rights Practices during Financial Crises
Human Rights Practices during Financial Crises
From the Great Depression in the twentieth century to the Great Recession in the twenty-first, systemic banking crises have been a recurring problem for both developing and developed countries. This book offers a human rights perspective on financial crises vis-à-vis low-income and least developed countries.  It systematically...
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results

The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.

Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...

Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Nowadays data accumulate at an alarming speed in various storage devices,
and so does valuable information. However, it is difficult to understand information
hidden in data without the aid of data analysis techniques, which
has provoked extensive interest in developing a field separate from machine
learning. This new field is
...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy