Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro SQL Server 2012 Reporting Services (Professional Apress)
Pro SQL Server 2012 Reporting Services (Professional Apress)

At its core, the process of designing reports hasn’t changed substantially in the past 20 years. The report designer lays out report objects, which contain data from a known source of data, in a design application such as Reporting Services, Business Objects Reports, or Microsoft Access. He or she then tests report execution,...

CFO Techniques: A Hands-on Guide to Keeping Your Business Solvent and Successful
CFO Techniques: A Hands-on Guide to Keeping Your Business Solvent and Successful

CFO Techniques: A Hands-on Guide to Keeping Your Business Solvent and Successful is a comprehensive and instructive working manual for multitasking chief financial officers and controllers working in the fast-paced commercial environment. Every senior financial professional with an ever-broadening span of control...

Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
How to Survive in the Jungle of Enterprise Architecture Frameworks: Creating or Choosing an Enterprise Architecture Framework
How to Survive in the Jungle of Enterprise Architecture Frameworks: Creating or Choosing an Enterprise Architecture Framework
Several times in my Enterprise Architecture (EA) practice, people asked me which framework shall I adopt or what are the benefits of the Zachman framework over TOGAF, etc. Others asked me to help them to define their own corporate EA framework. Before answering these types of questions, it is important to know what the differences and commonalities...
Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers

Anti–Money Laundering in a Nutshellis a concise, accessible, and practical guide to compliance with anti–money laundering law for financial professionals, corporate investigators, business managers, and all personnel of financial institutions who are required, under penalty of hefty fines, to get anti–money...

Pharmaceutical Manufacturing Handbook: Regulations and Quality (Pharmaceutical Development Series)
Pharmaceutical Manufacturing Handbook: Regulations and Quality (Pharmaceutical Development Series)
Everything you need to ensure full compliance and superior quality control

With its coverage of Food and Drug Administration regulations, international regulations, good manufacturing practices, and process analytical technology, this handbook offers complete coverage of the regulations and quality control issues that...

International IT Regulations and Compliance: Quality Standards in the Pharmaceutical and Regulated Industries
International IT Regulations and Compliance: Quality Standards in the Pharmaceutical and Regulated Industries

Standards, technologies, and requirements for computer validation have changed dramatically in recent years, and so have the interpretation of the standards and the understanding of the processes involved. International IT Regulations and Compliance brings together current thinking on the implementation of standards and regulations in...

Asterisk: The Definitive Guide (Definitive Guides)
Asterisk: The Definitive Guide (Definitive Guides)

This is a book for anyone who uses Asterisk.

Asterisk is an open source, converged telephony platform, which is designed primarily to run on Linux. Asterisk combines more than 100 years of telephony knowledge into a robust suite of tightly integrated telecommunications applications. The power of Asterisk lies in its...

Visual Basic 2010 Programmer's Reference (Wrox Programmer to Programmer)
Visual Basic 2010 Programmer's Reference (Wrox Programmer to Programmer)

Visual Basic expert Rod Stephens shows you how to leverage the latest features of VB 2010

Microsoft Visual Basic (VB) is the most popular programming language in the world, with millions of lines of code used in businesses and applications of all types and sizes. The new release of Visual Basic 2010 is tightly integrated with the...

CompTIA Security+ Review Guide: Exam SY0-401
CompTIA Security+ Review Guide: Exam SY0-401

Focused review for the CompTIA Security+ certification exam

The CompTIA Security+ certification offers tremendous opportunities for IT professionals. For those who want to take their careers to the next level, CompTIA Security+ Review Guide: Exam SY0-401 is here to serve as a great resource for certification...

Doing Business in 2005: Obstacles to Growth
Doing Business in 2005: Obstacles to Growth
Doing Business in 2005: Obstacles to Growth is the second in a series of annual reports investigating the scope and manner of regulations that enhance business activity and those that constrain it. New quantitative indicators on business regulations and their enforcement can be compared across more than 130 countries, and over time. The indicators...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy