Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
Business Processes: Operational Solutions for SAP Implementation
Business Processes: Operational Solutions for SAP Implementation
Business Processes: Operational Solutions for SAP Implementation deals with enterprise resource planning (ERP) systems implementation, and also business operations/processes and information systems to support business operations/processes. There are a large number of books treating ERP implementation, operations management and information systems...
Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Geographic Information Systems in Business
Geographic Information Systems in Business
This book contains state-of-the-art research studies on the concepts, theory, processes, and real world applications of geographical information systems (GIS) in business. Its chapters are authored by many of the leading experts in applying GIS and geospatial science to business. The book utilizes a wide variety of approaches and methodologies...
Handbook on Decision Support Systems 1: Basic Themes (International Handbooks on Information Systems)
Handbook on Decision Support Systems 1: Basic Themes (International Handbooks on Information Systems)
Decision support systems comprise a core subject area of the information systems (IS) discipline, being one of several major expansions that have occurred in the IS field. The decision support system (DSS) area, as a subject of research and practice, continues to grow along ever-widening horizons – often blending with other...
Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)
Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science (Premier Reference Source)
In the information technology age coupled with computer advances, information systems have become an integral part of many disciplines; accordingly, business, marketing, medicine, communication, banking, geography, physics, chemistry, aviation, pilots, forensics, agriculture, and even traf.c lights have one thing in common called...
Handbook on Decision Support Systems 2: Variations (International Handbooks on Information Systems)
Handbook on Decision Support Systems 2: Variations (International Handbooks on Information Systems)

As the most comprehensive reference work dealing with decision support systems (DSS), this book is essential for the library of every DSS practitioner, researcher, and educator. Written by an international array of DSS luminaries, it contains more than 70 chapters that approach decision support systems from a wide variety of perspectives....

IT Security Risk Control Management: An Audit Preparation Plan
IT Security Risk Control Management: An Audit Preparation Plan

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...

Supporting Real Time Decision-Making: The Role of Context in Decision Support on the Move
Supporting Real Time Decision-Making: The Role of Context in Decision Support on the Move

This volume of Annals of Information Systems will acknowledge the twentieth anniversary of the founding of the International Society for Decision Support Systems (ISDSS) by documenting some of the current best practices in teaching and research and envisioning the next twenty years in the decision support systems field. The volume is intended...

The Vest Pocket Guide to Information Technology
The Vest Pocket Guide to Information Technology
The only IT guide you need

You're busy—very busy. You need reliable, practical answers to your IT questions, and you need them now. The Vest Pocket Guide to Information Technology, Second Edition is a handy pocket problem-solver designed to provide you with the quickest route to a solution. Practical, reader-friendly, and thoroughly...

The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web
The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are...

Result Page: 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy