Home | Amazing | Today | Tags | Publishers | Years | Search 
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)

This IBM Redbook considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 (xSeries) platforms. This Redbook also documents the before and after configurations needed to take advantage of the recent...

Basics of Contemporary Cryptography for IT Practitioners
Basics of Contemporary Cryptography for IT Practitioners
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques...
Sketching User Experiences:  Getting the Design Right and the Right Design (Interactive Technologies)
Sketching User Experiences: Getting the Design Right and the Right Design (Interactive Technologies)
There is almost a fervor in the way that new products, with their rich and dynamic interfaces, are being released to the public-typically promising to make lives easier, solve the most difficult of problems, and maybe even make the world a better place. The reality is that few survive, much less deliver on their promise. The folly? An absence of...
Human computer Interaction And Management Information Systems: Foundations (Advances in Management Series)
Human computer Interaction And Management Information Systems: Foundations (Advances in Management Series)
"Human-Computer Interaction and Management Information Systems: Foundations" offers state-of-the-art research by a distinguished set of authors who span the MIS and HCI fields. The original chapters provide authoritative commentaries and in-depth descriptions of research programs that will guide 21st century scholars, graduate students,...
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Building A Global Information Assurance Program
Building A Global Information Assurance Program
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are...
Excel for the Math Classroom (Excel for Professionals series)
Excel for the Math Classroom (Excel for Professionals series)
This book was born out of a desire to help teachers teach their students math by being engaged in its study, and by showing teachers how they can custombuild visual examples of some of the concepts they are trying to get across to their students. Microsoft Excel is an extremely powerful spreadsheet with literally hundreds of built-in mathematical,...
Networks: Design and Management
Networks: Design and Management
Networks are groups of computers that communicate by either cable or wireless transmissions. By the use of computer networking, we can share data with others. Today, all businesses, small or large use some type of computers and most use computer networking to handle their daily business operations such as bookkeeping, inventory tracking, document...
Prince 2, Second Edition: A Practical Handbook (Computer Weekly Professional)
Prince 2, Second Edition: A Practical Handbook (Computer Weekly Professional)
PRINCE 2 is a flexible project management method, suitable for use on any type of project. It has been derived from professional Project Managers' experiences and refined over years of use in a wide variety of contexts.

Assessed as conformant with the concepts of PRINCE Version 2 by the PRINCE User Group Ltd

Fully updated
...
M-Learning: Mobile E-Learning
M-Learning: Mobile E-Learning
Imagine yourself stuck in a busy airport chock full of business commuters, watching delay after delay post to the digital screen that announces incoming and departing flights. You have your e-ticket confirmation in one hand and a handheld device in the other. Rather than allowing your time to be completely wasted by circumstances beyond your...
A Pattern Language for Web Usability
A Pattern Language for Web Usability
Despite the astronomical number of hours invested in developing websites for commercial and other uses, it is now clear that many websites are poorly designed and have floundered as a result.

There are four main aspects of website design that can affect a site's success: usability, content, navigation and aesthetics. The last three aspects all...

Result Page: 507 506 505 504 503 502 501 500 499 498 497 496 495 494 493 492 491 490 489 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy