Home | Amazing | Today | Tags | Publishers | Years | Search 
Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS Practical Implementation Guide and Workbook Second Edition

A one-stop resource for understanding and applying current International Financial Reporting Standards

The year 2007 proved to be yet another historic year of watershed events for the International Financial Reporting Standards (IFRS) firstly, due to the...

Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management
Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management
Data mining exploits the knowledge that is held in the enterprise data store by examining the data to reveal patterns that suggest better ways to produce profit, savings, higher-quality products, and greater customer satisfaction. Just as the lines on our faces reveal a history of laughter and frowns, the patterns embedded in data reveal a history...
The Art of Strategic Planning for Information Technology, 2nd Edition
The Art of Strategic Planning for Information Technology, 2nd Edition
The acclaimed IT strategic planning methodology now completely revised for the new millennium!

Bernard Boar, internationally recognized expert and IT consultant for Fortune 500 companies, overhauls his bestselling book on IT strategy to help IT professionals take on the new challenges of the hyper-competitive digital age. From assessing your...

Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
    Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
    New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the...
    Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control (Data Management Systems)
    Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control (Data Management Systems)

    Transactional Information Systems is the long-awaited, comprehensive work from leading scientists in the transaction processing field. Weikum and Vossen begin with a broad look at the role of transactional technology in today's economic and scientific endeavors, then delve into critical issues faced by all practitioners, presenting...

    The Culturally Customized Web Site: Customizing Web Sites for the Global Marketplace
    The Culturally Customized Web Site: Customizing Web Sites for the Global Marketplace
    In The Culturally Customized Web Site, Nitish Singh and Arun Pereira focus on cultural aspects of international website design, honing in on three objectives:

    * First, to present a review and survey results on standardization/localization issues on the web
    * Second, to present a scientifically tested framework to design culturally
    ...
    Web Services Security and E-business
    Web Services Security and E-business
    Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
    Network Query Language with CDROM
    Network Query Language with CDROM
    Learn about an exciting new technology that is revolutionizing network and Internet content delivery

    As the first pure language of the content engineering era, Network Query Language (NQL) is the ultimate tool for rapid and simple development of intelligent agents, bots, spiders, middleware, and scalable business-to-business content aggregation...

    Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
    Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
    Mobile phones are no longer just a means of calling another person. In several countries, mobile devices are used to pay for merchandise, receive time sensitive information and send e-mail messages. Additionally, corporations use mobile phones to access critical business information and send tasks to field workers, regardless of time or...
    Current Issues in Knowledge Management (Premier Reference Source)
    Current Issues in Knowledge Management (Premier Reference Source)
    As global enterprise grows increasingly reliant on electronic data, processes, and procedures, studies of the management of organizational knowledge are emergin at the forefront of critical research.

    Current Issues in Knowledge Management combines cutting-edge research on the cultural, technical, organizational, and human...

    Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 
    ©2024 LearnIT (support@pdfchm.net) - Privacy Policy