Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

An Introduction to 3D Computer Vision Techniques and Algorithms
An Introduction to 3D Computer Vision Techniques and Algorithms

Computer vision encompasses the construction of integrated vision systems and the application of vision to problems of real-world importance. The process of creating 3D models is still rather difficult, requiring mechanical measurement of the camera positions or manual alignment of partial 3D views of a scene. However using algorithms, it is...

IT Project Portfolio Management
IT Project Portfolio Management
While consulting for a large company’s information technology (IT) department, I was asked to help find a way to better manage the various IT projects that were spread among all of its business units. The executives wanted me to research tools that would help them prioritize the projects so they would know which ones were healthy contributors...
Mastering Data Warehouse Design: Relational and Dimensional Techniques
Mastering Data Warehouse Design: Relational and Dimensional Techniques
At last, a balanced approach to data warehousing that leverages the techniques pioneered by Ralph Kimball and Bill Inmon

Since its groundbreaking inception, the approach to understanding data warehousing has been split into two mindsets: Ralph Kimball, who pioneered the use of dimensional modeling techniques for building the data warehouse, and...

Building IBM: Shaping an Industry and Its Technology
Building IBM: Shaping an Industry and Its Technology

Beginning with the company's origins in the punched-card technology of the late nineteenth century, this wellresearched volume tells how IBM became so rapidly the dominant company in the computer industry. In doing so, it provides refreshing new insights on the origins and development of that industry.

The unique
...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Agile Estimating and Planning (Robert C. Martin Series)
Agile Estimating and Planning (Robert C. Martin Series)
This book could have been called Estimating and Planning Agile Projects. Instead, it's called Agile Estimating and Planning. The difference may appear subtle, but it's not. The title makes it clear that the estimating and planning processes must themselves be agile. Without agile estimating and planning, we cannot have agile projects....
Information Security Management Handbook, Fifth Edition
Information Security Management Handbook, Fifth Edition

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated...

Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."
—Henning Schulzrinne, Professor, Columbia University

Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust...

Essential Scrum: A Practical Guide to the Most Popular Agile Process
Essential Scrum: A Practical Guide to the Most Popular Agile Process

A Practical Guide to the Most Popular Agile Process

 

The Single-Source, Comprehensive Guide to Scrum for All Team Members, Managers, and Executives

 

If you want to use...

Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Mobile and Wireless Communications
Mobile and Wireless Communications
One of the very first books published on the social impact of the mobile phone was Timo Kopomaa’s The City in Your Pocket: Birth of the Mobile Information Society. The book, published in 2000, was based on research that Kopomaa had undertaken for Nokia and Sonera as part of his doctoral studies in the Centre for Urban and Regional Studies at...
Result Page: 48 47 46 45 44 43 42 41 40 39 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy