Home | Amazing | Today | Tags | Publishers | Years | Search 
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Marketing to the Social Web: How Digital Customer Communities Build Your Business
Marketing to the Social Web: How Digital Customer Communities Build Your Business
Praise for Marketing to the Social Web

"Weber understands that the world is going digital and that competitive advantage will accrue to those who understand the transformation. CEOs should heed this transformation and learn from Weber's insights how to navigate this new landscape to fully maximize their business opportunities."
...

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
An identity management system is defined as the management of the identity life cycle of entities (subjects or objects) during which the identity is established, described, and destroyed. What this definition fails to cover is the social, personal, and financial impact of the identity life cycle.

Before I joined Oracle as director of GRC
...
The Open Mobile Alliance: Delivering Service Enablers for Next-Generation Applications
The Open Mobile Alliance: Delivering Service Enablers for Next-Generation Applications

A practical overview of OMA specifications and how they enable mobile multimedia services & much more …!

The Open Mobile Alliance (OMA) is an industry forum, which develops open specifications to help in the creation of applications and services to be deployed over converged networks. The alliance is...

Programmer's Ultimate Security DeskRef
Programmer's Ultimate Security DeskRef
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software...
SAP GRC For Dummies (Computer/Tech)
SAP GRC For Dummies (Computer/Tech)
Governance, risk, and compliance—these three big letters can add up to one giant headache. But GRC doesn't have to be a boil on your corporate behind. SAP GRC For Dummies untangles the web of regulations that confronts your company and introduces you to software solutions the not only keep you in compliance, but also make your whole...
Ultra-Wideband Communications Systems: Multiband OFDM Approach (Wiley Series in Telecommunications & Signal Processing)
Ultra-Wideband Communications Systems: Multiband OFDM Approach (Wiley Series in Telecommunications & Signal Processing)
The only book that provides full coverage of UWB multiband OFDM technology

Ultra-wideband (UWB) has emerged as a technology that offers great promise to satisfy the growing demand for low-cost, high-speed digital networks. The enormous bandwidth available, the potential for high data rates, and the promise for small size and low processing...

Keeping Better Company: Corporate Governance Ten Years On
Keeping Better Company: Corporate Governance Ten Years On
This book is about the way companies are directed and controlled, and relate to their sources of finance—what has come to be called corporate governance. The term‘company’ is better than ‘corporation’ as it reflects the human dimension; companies are collections of people, not just inanimate structures.
...
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
"It is easy to write books that address broad topics and ideas leaving the reader with the question Yes, but how? By combining a comprehensive guide to data preparation for data mining along with specific examples in SAS, Mamdouh's book is a rare finda blend of theory and the practical at the same time. As anyone who has mined data will...
Parallel Programming in OpenMP
Parallel Programming in OpenMP
"This book will provide a valuable resource for the OpenMP community."

- Timothy G. Mattson, Intel Corporation

"This book has an important role to play in the HPC community-both for introducing practicing professionals to OpenMP and for educating students and professionals about parallel programming. I'm happy...

Moderating Usability Tests: Principles and Practices for Interacting (Interactive Technologies)
Moderating Usability Tests: Principles and Practices for Interacting (Interactive Technologies)
Many aspects of usability testing have been thoroughly studied and documented. This isnt true, however, of the details of interacting with the test participants who provide the critical usability data. This omission has meant that there have been no training materials and no principles from which new moderators can learn how to interact.
...
I. M. Wright's  Hard Code (Best Practices)
I. M. Wright's Hard Code (Best Practices)
From the popular I. M. Wrights Hard Code column at Microsoft, this book presents a series of thematically-arranged essays. It features provocative insights about development processes that can spark the imaginationand help simulate productivity.

Key Book Benefits:

Provides insights into how Microsoft drives excellence in...

Result Page: 48 47 46 45 44 43 42 41 40 39 38 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy