Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Actionable Intelligence: A Guide to Delivering Business Results with Big Data Fast!
Actionable Intelligence: A Guide to Delivering Business Results with Big Data Fast!

Building an analysis ecosystem for a smarter approach tointelligence

Keith Carter's Actionable Intelligence: A Guide to DeliveringBusiness Results with Big Data Fast! is the comprehensive guideto achieving the dream that business intelligence practitionershave been chasing since the concept itself came into being....

The Language of Design: Theory and Computation
The Language of Design: Theory and Computation
The Language of Design: Theory and Computation articulates the theory that there is a language of design. This theory claims that any language of design consists of a set of symbols, a set of relations between the symbols, features that key the expressiveness of symbols, and a set of reality producing information processing behaviors...
Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library)
Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library)

This book presents innovative theories, methodologies, and techniques in the field of risk management and decision making. It introduces new research developments and provides a comprehensive image of their potential applications to readers interested in the area. The collection includes: computational intelligence applications in decision...

Common Warehouse Metamodel Developer's Guide
Common Warehouse Metamodel Developer's Guide
The official guide on how to develop interoperable data warehouse and business intelligence applications from the authors of the CWM specification

This authoritative guide will show you how to develop interoperable data warehouse and business intelligence applications using the Common Warehouse Metamodel (CWM) specification. It provides you...

Project Management Absolute Beginner's Guide (3rd Edition)
Project Management Absolute Beginner's Guide (3rd Edition)

Succeed as a project manager, even if you’ve never run a project before! This book is the fastest way to master every project management task, from upfront budgeting and scheduling through execution, managing teams through closing projects, and learning from experience. Updated for the latest web-based project...

Next.js Quick Start Guide: Server-side rendering done right
Next.js Quick Start Guide: Server-side rendering done right

Create, build and deploy universal JavaScript applications using Next.js

Key Features

  • Work with the entire tool-chain for developing universal Javascript applications with Next.js
  • A straightforward guide to implementing server-side rendering
  • Use Next.js to...
Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line
Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line

Reduce the environmental and budgetary impact of your IT infrastructure

This groundbreaking work offers a complete roadmap for integrating environmentally sound techniques and technologies into your Information Systems architecture. Green IT explains how to adopt a business-driven green initiative and provides a...

The Offshoring Challenge: Strategic Design and Innovation for Tomorrow's Organization
The Offshoring Challenge: Strategic Design and Innovation for Tomorrow's Organization

The continuous search for efficiency gains and the goal of attaining a sustainable competitive advantage have steadily increased the volume of goods and services procured globally from third party vendors. In this context, named as “the next wave of globalization”, the offshoring phenomenon has stimulated research and political...

Manage IT!: Organizing IT Demand and IT Supply
Manage IT!: Organizing IT Demand and IT Supply
"This book discusses IT supply and demand, analyzing functional requirements and operational processes, using methods such as those defined in the IT infrastructure library (ITIL). This book will be useful for understanding the key concepts behind modern service-oriented IT organizations. In a nutshell, this is a good book and a good...
Computer Graphics for Artists: An Introduction
Computer Graphics for Artists: An Introduction

Computer Graphics for Artists: an introduction is an application-independent, reader-friendly primer for anyone with a serious desire to understand 3D Computer Graphics

Opening with the first and most basic elements of computer graphics, the book rapidly advances into progressively more complex concepts. Each of the elements,...

Cubicle Warfare: 101 Office Traps and Pranks
Cubicle Warfare: 101 Office Traps and Pranks

Get revenge on all your annoying coworkers with this guide to 101 awesome office pranks

Are your eyes beginning to glaze over from the fluorescent lights in your tiny cubicle? Have you had one too many burnt cups of coffee? Does the guy in the cube next to you insist on pencil-drumming while cranking "Hells Bells" and...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy