|
|
|
|
IT Portfolio Management: Unlocking the Business Value of TechnologyThis book provides a pragmatic, step-by-step road map, describing IT portfolio management and its major elements. Chapter 1 provides an overview of IT portfolio management. Chapter 2 describes the planning aspects of IT portfolio management. It explains the IT portfolio management maturity model and the key people, process, and... | | | | Making Use of Python
A step-by-step guide on how to use Python for CGI scripting, GUI development, network programming, and much more!
Organizations such as NASA, Hewlett-Packard, and Xerox have already discovered the power that Python has to offer. This multipurpose development language can be used on virtually every platform, from Windows and Linux... |
|
|
| | RFID-A Guide to Radio Frequency IdentificationThis book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be taken in the future. The role of middleware software to route data between the... | | |
|
Microsoft Exchange 2013 Cookbook
Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise.
Overview
-
Deploy Microsoft Exchange 2013 in the real world
-
Understand...
| | Run-time Models for Self-managing Systems and Applications (Autonomic Systems)
This edited volume focuses on the adoption of run-time models for the design and management of autonomic systems. Traditionally, performance models have a central role in the design of computer systems. Models are used at design-time to support the capacity planning of the physical infrastructure and to analyze the effects and trade-offs of... | | Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Must-have guide for professionals responsible for securing credit and debit card transactions
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking... |
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |