Home | Amazing | Today | Tags | Publishers | Years | Search 
Using Social Media for Global Security
Using Social Media for Global Security

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!

During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and...

Expert Oracle Enterprise Manager 12c
Expert Oracle Enterprise Manager 12c

Enterprise Manager 12c (EM12c), Oracle’s newest and fully-integrated enterprise management product, now provides a complete cloud lifecycle management solution and enterprise environment management interface. Expert Oracle Enterprise Manager 12c opens up the secrets of this incredible management tool, saving...

Managing Humans: Biting and Humorous Tales of a Software Engineering Manager
Managing Humans: Biting and Humorous Tales of a Software Engineering Manager

The humor and insights in the 2nd Edition of Managing Humans are drawn from Michael Lopp's management experiences at Apple, Netscape, Symantec, and Borland, among others. This book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other and occasionally throw...

In Search of Stupidity: Over Twenty Years of High Tech Marketing Disasters
In Search of Stupidity: Over Twenty Years of High Tech Marketing Disasters

In Search of Stupidity: Over Twenty Years of High-Tech Marketing Disasters, Second Edition is National Lampoon meets Peter Drucker. It's a funny and well-written business book that takes a look at some of the most influential marketing and business philosophies of the last twenty years. Through the dark glass of hindsight, it...

Guarding Your Business: A Management Approach to Security (Modern Approaches in Geophysics)
Guarding Your Business: A Management Approach to Security (Modern Approaches in Geophysics)

Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered...

Craniofacial Identification
Craniofacial Identification

The promotion of CCTV surveillance and identity cards, along with ever heightened security at airports, immigration control and institutional access, has seen a dramatic increase in the use of automated and manual recognition. In addition, several recent disasters have highlighted the problems and challenges associated with current disaster...

Oracle Database Administration: The Essential Refe
Oracle Database Administration: The Essential Refe

Oracle database administration requires a vast amount of information and an ability to perform a myriad of tasks--from installation to tuning to network troubleshooting to overall daily administration. Oracle provides many tools for performing these tasks; the trick is knowing what tool is right for the job, what commands you need to...

Complete Book of Remote Access: Connectivity and Security (Best Practices)
Complete Book of Remote Access: Connectivity and Security (Best Practices)

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how...

Designing Hyper-V Solutions
Designing Hyper-V Solutions

Deploy Microsoft Virtualization and VDI solutions using real-world Hyper-V configurations

About This Book

  • Get acquainted with the basics of Windows Server Hyper-V 2012 R2 and understand how to efficiently design a highly available virtualization solution
  • Assess your physical server...
Hadoop Backup and Recovery solutions
Hadoop Backup and Recovery solutions

Learn the best strategies for data recovery from Hadoop backup clusters and troubleshoot problems

About This Book

  • Learn the fundamentals of Hadoop's backup needs, recovery strategy, and troubleshooting
  • Determine common failure points, intimate HBase, and explore different backup...
Anonymizing Health Data: Case Studies and Methods to Get You Started
Anonymizing Health Data: Case Studies and Methods to Get You Started

Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to...

Healthy SQL: A Comprehensive Guide to Healthy SQL Server Performance
Healthy SQL: A Comprehensive Guide to Healthy SQL Server Performance

Healthy SQL is about ensuring the ongoing performance health of a SQL Server database. An unhealthy database is not just an inconvenience; it can bring a business to its knees. And if you are the database administrator, the health of your SQL Server implementation can be a direct reflection on you. It's in everyone's best...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy