Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Electrician's Troubleshooting and Testing Pocket Guide, Third Edition
Electrician's Troubleshooting and Testing Pocket Guide, Third Edition
The ultimate electrical equipment troubleshooting pocket guide

Designed for quick reference at any job site, the Electrician's Troubleshooting and Testing Pocket Guide enables electricians using portable meters to test, maintain, and troubleshoot all types of electrical equipment and systems.

This updated...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Cloud Standards: Agreements That Hold Together Clouds
Cloud Standards: Agreements That Hold Together Clouds

Cloud computing is often described as providing computing resources the way electric utilities provide energy. In theory, anyone with an adequate connection to the Internet should be able to tap into a cloud provider and get exactly the computing resources they want when they want it, just like plugging into the electricity grid and...

An Introduction to 3D Computer Vision Techniques and Algorithms
An Introduction to 3D Computer Vision Techniques and Algorithms

Computer vision encompasses the construction of integrated vision systems and the application of vision to problems of real-world importance. The process of creating 3D models is still rather difficult, requiring mechanical measurement of the camera positions or manual alignment of partial 3D views of a scene. However using algorithms, it is...

Sams Teach Yourself C++ in 21 Days (5th Edition)
Sams Teach Yourself C++ in 21 Days (5th Edition)
Join the leagues of thousands of programmers and learn C++ from some of the best. The fifth edition of the best seller Sams Teach Yourself C++ in 21 Days, written by Jesse Liberty, a well-known C++ and C# programming manual author and Bradley L. Jones, manager for a number of high profiler developer websites, has been updated to the new...
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

Executive Intelligence: The Leader's Edge
Executive Intelligence: The Leader's Edge

Executive Intelligence zeros in on leadership smarts and notes that in all lists compiled by leadership experts, head hunters, and boards of directors the one and only trait that appears in all is intelligence. Obvious? No, because typically leadership savvy regularly trumps smarts....

IT Best Practices for Financial Managers
IT Best Practices for Financial Managers

Praise for IT Best Practices

"The work of the financial manager revolves around a company's financial systems. Ms. Roehl-Anderson's latest offering addresses the two key aspects of these systems—how to buy and install them. The book covers every conceivable aspect of these systems, including ERP, software...

Game Design Workshop: Designing, Prototyping, Playtesting Games
Game Design Workshop: Designing, Prototyping, Playtesting Games

Master the craft of game design so you can create that elusive combination of challenge, competition, and interaction that players seek. This design workshop begins with an examination of the fundamental elements of game design; then puts you to work in prototyping, playtesting, and redesigning your own games with exercises that teach essential...

Moving To The Cloud: Developing Apps in the New World of Cloud Computing
Moving To The Cloud: Developing Apps in the New World of Cloud Computing
Information is the most valuable resource in the 21st century. Whether for a consumer looking for a restaurant in San Francisco, a small business woman checking textile prices in Bangalore, or a financial services executive in London studying stock market trends, information at the moment of decision is key in providing the...
Knowledge Governance: Processes and Perspectives
Knowledge Governance: Processes and Perspectives
While there are many books on knowledge management, knowledge governance is a concept that has not been so well explored, and is much less understood. Knowledge governance refers to choosing structures and mechanisms that can influence the processes of sharing and creating knowledge.

The book argues that knowledge governance is a
...
Result Page: 48 47 46 45 44 43 42 41 40 39 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy