|
|
|
|
| | | | Enterprise Systems Backup and Recovery: A Corporate Insurance PolicyThis volume provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information... |
|
Public Libraries and the Internet: Roles, Perspectives, and Implications
The integration of technology into public library services has been a continual
process across the eighteenth, nineteenth, twentieth, and twenty-first centuries,
in which libraries have responded to new technologies, altering the ways
that information could be recorded, accessed, and used. The Internet is a
prominent recent example,... | | HL7 for BizTalk
HL7 for BizTalk provides a detailed guide to the planning and delivery of a HL7-compliant system using the dedicated Microsoft BizTalk for HL7 Accelerator. The HL7 Primary Standard, its various versions, and the use of the HL7 Accelerator for BizTalk are broken out and fully explained. HL7 for BizTalk provides clear guidance... | | |
|
|
Introduction to Real Analysis (2nd Edition)
This text is a single variable real analysis text, designed for the one-year course at the junior, senior, or beginning graduate level. It provides a rigorous and comprehensive treatment of the theoretical concepts of analysis. The book contains most of the topics covered in a text of this nature, but it also includes many... | | Information Security Fundamentals, Second Edition
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides... | | IT Auditing: Using Controls to Protect Information AssetsPlan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |