Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IT Portfolio Management: Unlocking the Business Value of Technology
IT Portfolio Management: Unlocking the Business Value of Technology
This book provides a pragmatic, step-by-step road map, describing IT portfolio
management and its major elements. Chapter 1 provides an overview of IT
portfolio management. Chapter 2 describes the planning aspects of IT portfolio
management. It explains the IT portfolio management maturity model and the
key people, process, and
...
Joomla! A User's Guide: Building a Successful Joomla! Powered Website
Joomla! A User's Guide: Building a Successful Joomla! Powered Website

The First Easy-to-Use Guide to Joomla!-The World's #1 Open Source Content Management System

If you want to build sophisticated websites that can be easily edited and updated, you need to master...

Making Use of Python
Making Use of Python

A step-by-step guide on how to use Python for CGI scripting, GUI development, network programming, and much more!

Organizations such as NASA, Hewlett-Packard, and Xerox have already discovered the power that Python has to offer. This multipurpose development language can be used on virtually every platform, from Windows and Linux...

IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. Written as a contribution to the accounting and auditing...

CISSP All-in-One Exam Guide, 6th Edition
CISSP All-in-One Exam Guide, 6th Edition

A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris

Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by...

SharePoint Server 2010 Enterprise Content Management
SharePoint Server 2010 Enterprise Content Management

SharePoint experts focus on SharePoint 2010 as a platform for Enterprise Content Management

SharePoint allows all users in an organization to manage and share their content reliably and securely. If you're interested in building Web sites using the new capabilities of enterprise content management (ECM) in SharePoint 2010, then...

Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
RFID-A Guide to Radio Frequency Identification
RFID-A Guide to Radio Frequency Identification
This book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be taken in the future. The role of middleware software to route data between the...
MCTS Self-Paced Training Kit (Exam 70-236): Configuring Microsoft  Exchange Server 2007 (PRO-Certification)
MCTS Self-Paced Training Kit (Exam 70-236): Configuring Microsoft Exchange Server 2007 (PRO-Certification)
Announcing an all-new SELF-PACED TRAINING KIT designed to help maximize your performance on 70-236, the required exam for the new Microsoft Certified Technology Specialist (MCTS): Configuring Microsoft Exchange Server 2007 certification. This 2-in-1 kit includes the official Microsoft study guide plus practice tests on CD to help you assess your...
Microsoft Exchange 2013 Cookbook
Microsoft Exchange 2013 Cookbook

Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise.

Overview

  • Deploy Microsoft Exchange 2013 in the real world
  • Understand...
Run-time Models for Self-managing Systems and Applications (Autonomic Systems)
Run-time Models for Self-managing Systems and Applications (Autonomic Systems)

This edited volume focuses on the adoption of run-time models for the design and management of autonomic systems. Traditionally, performance models have a central role in the design of computer systems. Models are used at design-time to support the capacity planning of the physical infrastructure and to analyze the effects and trade-offs of...

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy