Home | Amazing | Today | Tags | Publishers | Years | Search 
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Project Workout: A Toolkit for reaping the rewards from all your business projects (3rd Edition)
Project Workout: A Toolkit for reaping the rewards from all your business projects (3rd Edition)
The forward progress of companies has always depended heavily on the management of projects. New plants, new products, new organizations, new methods, new ventures – all required dedicated teams working to strict timetables and separate budgets. But today there’s a vital difference. The project management mode has...
Reliable Knowledge Discovery
Reliable Knowledge Discovery
With the rapid development of the data mining and knowledge discovery, a key issue which could significantly affect the real world applications of data mining is the reliability issues of knowledge discovery. It is natural that people will ask if the discovered knowledge is reliable. Why do we trust the discovered knowledge? How...
AAA Identity Management Security (Networking Technology: Security)
AAA Identity Management Security (Networking Technology: Security)

This book is focused on providing the skills necessary to successfully configure authentication, authorization, and accounting (AAA) services on Cisco devices using Cisco Secure Access Control Server/System 4.2 and 5.1. This book was motivated by a desire to provide a one-stop resource for AAA solutions on Cisco...

Pollution Prevention through Process Integration: Systematic Design Tools
Pollution Prevention through Process Integration: Systematic Design Tools
Processing facilities are complex systems of unit operations and streams. Consequently, their environmental impact cannot be optimally mitigated by simple end-of-pipe measures. Instead, it is crucial to gain global insights into how mass flows throughout the process and to use these insights as a consistent basis for developing...
Cisco Unified Customer Voice Portal: Building Unified Contact Centers (Networking Technology: IP Communications)
Cisco Unified Customer Voice Portal: Building Unified Contact Centers (Networking Technology: IP Communications)

The definitive guide to deploying Cisco Unified Customer Voice Portal IVRs in any contact center environment

 

Thousands of companies are replacing legacy ACD/TDM-based contact centers with pure IP-based unified contact center solutions. One of these...

Professional Microsoft SQL Server 2012 Integration Services
Professional Microsoft SQL Server 2012 Integration Services

THE MOST IMPORTANT BUSINESS intelligence tool in the Microsoft Swiss Army knife of tools is SQL Server Integration Services (SSIS). This is because the other tools would be nothing without the cleansing and movement of data into a presentable format. The product can extract, transform, and load (ETL) data astonishingly fast. A 2010 benchmark...

Software Receiver Design: Build Your Own Digital Communication System in Five Easy Steps
Software Receiver Design: Build Your Own Digital Communication System in Five Easy Steps

Have you ever wanted to know how modern digital communications systems work? Find out with this step-by-step guide to building a complete digital radio that includes every element of a typical, real-world communication system. Chapter by chapter, you will create a MATLAB realization of the various pieces of the system, exploring the key ideas...

Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
Computing is transforming our society in ways that are as profound as the changes wrought by physics and chemistry in the previous two centuries. Indeed, there is hardly an aspect of our lives that hasn't already been influenced, or even revolutionized, by digital technology. Given the importance of computing to modern society,...
The Complete HIV/AIDS Teaching Kit with CD-Rom
The Complete HIV/AIDS Teaching Kit with CD-Rom

A unique multi-media teaching kit for those instructing clients, staff, and students about HIV/AIDS. The CD Includes: " PowerPoint slides " In-classroom learning activities " Supplemental homework assignments " Recommended reading lists " Web resources " And much more!

HIV/AIDS has rapidly...

Professional Sitecore Development
Professional Sitecore Development
RECENT YEARS HAVE SEEN DRAMATIC EXPANSION in the use of mobile computing and social media on the Internet. Organizations show increasing interest in web analytics, and will soon comprehend the importance of engagement and experience management and monitoring. With the increasing value of Search Engine Optimization (SEO) and the...
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)

“For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable.”

—Vint Cerf, Internet pioneer

 

...
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy