Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Value-Based Software Engineering
Value-Based Software Engineering

The IT community has always struggled with questions concerning the value of an organization’s investment in software and hardware. It is the goal of value-based software engineering (VBSE) to develop models and measures of value which are of use for managers, developers and users as they make tradeoff decisions between, for example,...

Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)
Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)
Windows Embedded CE is a 32 - bit, native, hard, real - time, small - footprint operating system developed by Microsoft to address the needs of handheld, mobile, and embedded devices. With support for multiple processor architectures, Windows Embedded CE can be adapted to a variety of devices like Smartphones, PocketPCs, set - top boxes, thin -...
Business Restructuring: An Action Template for Reducing Cost and Growing Profit
Business Restructuring: An Action Template for Reducing Cost and Growing Profit

An effective, long-term strategy for maintaining corporate growth, profit and competitive edge

Depicting a progressive emergent framework for long-term growth, profitability, and success, Business Restructuring: An Action Template for Reducing Cost and Growing Profit employs an integrated approach incorporating several of...

Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
Patterns for e-business
Patterns for e-business
Get an inside look at how successful businesses build their e-business architectures. In this book, four IBM e-business experts capture years of experience into easy-to-follow guidelines. Deliberately focusing on Business patterns, Integration patterns, and Application patterns, the authors share with you proven architectural patterns that can help...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

PMP: Project Management Professional Exam Study Guide, Includes Audio CD
PMP: Project Management Professional Exam Study Guide, Includes Audio CD

Prepare for the Latest Project Management Professional Exam

Prepare for the latest Project Management Professional (PMP®) certification exam with this new edition of the PMP Study Guide, which covers all essential procedures and concepts from A Guide to the Project Management Body of Knowledge (PMBOK® Guide), Fourth Edition....

Multisite Commerce: Proven Principles for Overcoming the Business, Organizational, and Technical Challenges
Multisite Commerce: Proven Principles for Overcoming the Business, Organizational, and Technical Challenges

Plan, Manage, and Architect Multiple Web Sites for Maximum Efficiency and Business Value

 

For many companies, one Web site is no longer enough. Business strategy requires multiple Web sites, each with carefully targeted audiences and marketing...

Engineering Design via Surrogate Modelling: A Practical Guide
Engineering Design via Surrogate Modelling: A Practical Guide
Think of a well-known public personality whom you could easily identify from a photograph. Consider now whether you would still recognize them if most of the photograph was obscured, except for the corner of an eye, a small part of their chin and, perhaps, a half of their mouth. This is a game often played on television quiz shows...
Microeconomics (7th Edition)
Microeconomics (7th Edition)

KEY BENEFIT: This book is well known for its coverage of modern topics (Game theory, Economics of Information, and Behavioral Economics), clarity of its writing style and graphs, and integrated use of real world examples.

KEY TOPICS: The emphasis on relevance and application to...

Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
The book consists of a collection of works on utilising the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID...
Result Page: 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy