Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

Family Business as Paradox (A Family Business Publication)
Family Business as Paradox (A Family Business Publication)

Rather than having to choose between the family and the business, the authors argue that if family-owned businesses can consciously manage and over time, perhaps, synthesize these contradictions, the Family Enterprise will have a long-term strategic and competitive advantage and the family will remain committed to continuity.

...
The Concept of Number: From Quaternions to Monads and Topological Fields (Mathematics and Its Applications)
The Concept of Number: From Quaternions to Monads and Topological Fields (Mathematics and Its Applications)
This book consists of lectures that I have given, in Darmstadt since 1974, under various titles, for beginners or students of the third semester.

I have tried to concentrate on those themes concerning numbers, which seem to me to be the most important on essential and historical grounds, and which in my opinion
...
An Atlas of Gynecologic Oncology
An Atlas of Gynecologic Oncology

While there are a plethora of practical texts relating to general gynecology, there are few specific to gynecological oncology. Taking a "cookbook" approach with clearly written and pictorial instructions, Atlas of Gynecologic Oncology: Investigation and Surgery describes and illustrates important procedures in the repertoire of a...

Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)

The best fully integrated study system available for the CompTIA Security+ exam!

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

With hundreds of...

Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)

A practical guide for business calculations

Mastering Financial Mathematics in Microsoft © Excel provides a comprehensive set of tools, methods and formulas which apply Excel to solving mathematical problems.

The book:

  • Explains basic calculations for mathematical finance
  • ...
Data Protection
Data Protection

This is the fundamental truth about data protection: backup is dead.

Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.

So what is data...

Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Get SQL Server up and running on the Linux operating system and containers. No database professional managing or developing SQL Server on Linux will want to be without this deep and authoritative guide by one of the most respected experts on SQL Server in the industry. Get an inside look at how SQL Server for Linux works through the...
Contesting Peace in the Postwar City: Belfast, Mitrovica and Mostar (Rethinking Peace and Conflict Studies)
Contesting Peace in the Postwar City: Belfast, Mitrovica and Mostar (Rethinking Peace and Conflict Studies)

“Contesting Peace in the Postwar City is key reading for urban and peace and conflict scholars. In this impressive and meticulously researched book, Gusic reflects on the ways in which divisions are routinised in the everyday landscape of divided cities and skilfully investigates how change and continuity are governed in...

Design of Reinforced Concrete Silo Groups (Building Pathology and Rehabilitation)
Design of Reinforced Concrete Silo Groups (Building Pathology and Rehabilitation)

This book offers a new calculation procedure of the structural behavior of grouped layout of silos, easy to use and with satisfactory responses.

Groups of reinforced concrete silos are structures commonly used in the food industry, where it is usually necessary to separate the storage of different types and sources of...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy