Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Getting Started with Greenplum for Big Data Analytics
Getting Started with Greenplum for Big Data Analytics

Big Data started off as a technology buzzword rapidly growing into the headline agenda of several corporate strategies across industry verticals. With the amount of structured and unstructured data available to organizations exploding, analysis of these large data sets is increasingly becoming a key basis of competition, productivity growth,...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Networking Self-Teaching Guide: OSI, TCP/IP, LAN's, MAN's, WAN's, Implementation, Management, and Maintenance (Wiley Self Teaching Guides)
Networking Self-Teaching Guide: OSI, TCP/IP, LAN's, MAN's, WAN's, Implementation, Management, and Maintenance (Wiley Self Teaching Guides)
IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find this a valuable and up-to-date resource. This hands-on guide is designed so that you can select,...
Professional PHP5 (Programmer to Programmer)
Professional PHP5 (Programmer to Programmer)
What is this book about?

With the release of PHP 5 and the Zend Engine 2, PHP finally graduates from it earliest days as a lightweight scripting syntax to an powerful object oriented programming language that can hold its own against the Java and .NET architectures that currently dominate corporate software development....

Developing Enterprise iOS Applications: iPhone and iPad Apps for Companies and Organizations
Developing Enterprise iOS Applications: iPhone and iPad Apps for Companies and Organizations

If you plan to develop iOS applications in a corporate setting—for internal consumption or for sale to end users—you need to read this book. Veteran developer James Turner shares best practices and lessons learned from his recent on-the-ground experience planning, building, and shipping an iOS application in an enterprise...

Business and Competitive Analysis: Effective Application of New and Classic Methods
Business and Competitive Analysis: Effective Application of New and Classic Methods

“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.”
--Bill Fiora, Partner and Founder, Outward Insights

  

Continuous Delivery and DevOps: A Quickstart guide
Continuous Delivery and DevOps: A Quickstart guide

Streamline and optimize your workflow with this fast and engaging guide to continuous delivery and DevOps. Delivering quality software every time will become a way of life.

Overview

  • Real world and realistic examples of how to go about implementing continuous delivery and DevOps
  • Learn...
Six Sigma Business Scorecard : Creating a Comprehensive Corporate Performance Measurement System
Six Sigma Business Scorecard : Creating a Comprehensive Corporate Performance Measurement System
Ensuring growth and profitability through performance

 

PLAN * IMPLEMENT * MEASURE * ADJUST * PROFIT

 

"Great book! The readers should keep their highlighters handy for they will find many points that they will want to remember." -- H. James Harrington, Ph.D., Author of Business
...
Omnipage Power!
Omnipage Power!
With substantially increased accuracy and the ability to convert both scanned documents and PDF files into editable text and images for use in computer software applications such as MS Word and Excel, OmniPage Pro 11 has become an essential tool for the digital workplace. "OmniPage Power!" is here to help you make maximum use of the...
Result Page: 99 98 97 96 95 94 93 92 91 90 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy