Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

The Blockchain Developer: A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects
The Blockchain Developer: A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects

Become a Blockchain developer and design, build, publish, test, maintain and secure scalable decentralized Blockchain projects using Bitcoin, Ethereum, NEO, EOS and Hyperledger.  

This book helps you understand Blockchain beyond development and crypto to better harness its power and capability. You will learn...

Green Tech: How to Plan and Implement Sustainable IT Solutions
Green Tech: How to Plan and Implement Sustainable IT Solutions
“Green” is a feel-good term. It has positive, earth-friendly connotations, often without much specificity—perfect for marketing purposes. Sustainability, on the other hand, is something we can measure and manage. We are sustainable when our use of resources does not permanently deplete or damage our supply, including natural...
Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Try Common Sense: Replacing the Failed Ideologies of Right and Left
Try Common Sense: Replacing the Failed Ideologies of Right and Left

Award-winning author Philip K. Howard lays out the blueprint for a new American society.

In this brief and powerful book, Philip K. Howard attacks the failed ideologies of both parties and proposes a radical simplification of government to re-empower Americans in their daily choices. Nothing will make...

Electrical Installation Calculations: For compliance with BS 7671: 2001 (The Wiring Regulations)
Electrical Installation Calculations: For compliance with BS 7671: 2001 (The Wiring Regulations)
This book provides guidance on how to carry out the calculations required for circuit designs in compliance with the Wiring Regulations. It has been updated to take account of changes introduced by BS 7671 : 2001 and Amendment 1 to the standard which included a new table of current-carrying capacities.

The book makes extensive use of worked...

CompTIA Healthcare IT Technician HIT-001 Authorized Cert Guide (Cert Guides)
CompTIA Healthcare IT Technician HIT-001 Authorized Cert Guide (Cert Guides)

This study guide helps you master all the topics on the new Healthcare IT Technician HIT-001 exam, including

  • Healthcare IT roles and trends
  • Standards agencies, laws, and regulations
  • ...
Management of Acute Coronary Syndromes (Contemporary Cardiology)
Management of Acute Coronary Syndromes (Contemporary Cardiology)

In this second edition of his highly acclaimed book, Christopher P. Cannon, MD, and a team of preeminent clinical investigators have thoroughly revised and expanded every chapter to reflect the recent explosion of clinical trials on the management of acute coronary syndromes (ACS). This includes: the newer tests, such as C reactive protein; a...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
Business rules engines can make organizations more agile by allowing them to manage diverse sets of operating rules, such as many different contracts for goods and services with different clients. For example, business rules engines can contain interfaces that allow users to define business rules to add specific functionality to software...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”  

John McAuley,EMC Corporation

"This book details innovative technology...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy