Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

The Value Factor: How Global Leaders Use Information for Growth and Competitive Advantage
The Value Factor: How Global Leaders Use Information for Growth and Competitive Advantage

Capitalizing on the information a company owns about its customers, suppliers and partners is now the value proposition for sustainable long-term growth. Authors Mark Hurd and Lars Nyberg go inside companies to see the value proposition in practice. Combining case studies and analysts’ insights with common sense and surprisingly simple...

Java Server Programming Java EE 5 (J2EE 1.5) Black Book
Java Server Programming Java EE 5 (J2EE 1.5) Black Book
Many bookstores offer numerous choices of books on Java Server Programming; however, most of these books are intricate and complex to grasp. So, what are your chances of picking up the right one? If this question has been troubling you, be rest assured now! This book, Java Server Programming: Java EE 5 (J2EE 1.5) Black Book, Platinum Edition, is a...
CSS Fonts
CSS Fonts

From custom fonts to ad-hoc font families you assemble out of a variety of individual faces, CSS 3 gives you more typographic options than ever before. This concise guide shows you how to use CSS properties to gain a fine-grained and wide-ranging influence over how you display fonts on the Web.

Short and sweet, this book...

Javascript Programmer's Reference
Javascript Programmer's Reference
The book is aimed at people who already have some knowledge of JavaScript and need a companion volume to their daily work. It is primarily aimed at the experienced practitioner, and so does not attempt to be a tutorial for the beginner.

For a tutorial book, we suggest Paul Wilton's Beginning
...
Timing
Timing
With the advent of nanometer technologies, circuit performance constraints are becoming ever more stringent. In this context, automated timing analysis and optimization becomes imperative for the design of high-performance circuits that must satisfy a demanding set of constraints. Timing overviews the state of the art in timing...
Linux Ethernet Howto
Linux Ethernet Howto
The Linux Ethernet-HOWTO is a compilation of information about which Ethernet devices can be used for Linux, and how to set them up. This HOWTO is focused on the hardware and low-level driver aspect of the Ethernet cards, and does not cover the software end of things like ifconfig and route (this material is covered in the Network HOWTO).
...
Computing Information Technology: The Human Side
Computing Information Technology: The Human Side
From the senior management to the clerical and support group levels, this study addresses the possible pitfalls and triumphs of implementing information technology (IT) into organizations in terms of organizational strategies, structures, and communication methods. Issues of human-computer interaction, ethics, privacy, and security are raised to...
JDBC, Servlets and JSP Black Book
JDBC, Servlets and JSP Black Book
This is a unique book for self learning and getting expertization in java database and Web technologies as JDBC, Servlet, JSP, JSTL and JSF. This book is not only useful for self updating readers but also useful for the readers who already known the concepts and get more indept knowledge on the topic this book is titled. This book gives complete...
The JR Programming Language: Concurrent Programming in an Extended Java
The JR Programming Language: Concurrent Programming in an Extended Java
JR is a language for concurrent programming. It is an imperative language that provides explicit mechanisms for concurrency, communication, and synchronization. JR is an extension of the Java programming language with additional concurrency mechanisms based on those in the SR (Synchronizing Resources) programming language. It is suitable for...
Windows Forensics: The Field Guide for Corporate Computer Investigations
Windows Forensics: The Field Guide for Corporate Computer Investigations

The evidence is in--to solve Windows crime, you need Windows tools

An arcane pursuit a decade ago, forensic science today is a household term. And while the computer forensic analyst may not lead as exciting a life as TV's CSIs do, he or she relies just as heavily on scientific principles and just as surely solves crime.

Whether...

AJAX Black Book
AJAX Black Book
This book, AJAX Black Book, discusses what Ajax is and what it means to Web developers, as well as the technologies behind Ajax applications. Working through this book, you'll discover how Ajax gives web developers the ability to build applications that are more interactive, more dynamic, more exciting and enjoyable for their users. This book shows...
unlimited object storage image
Result Page: 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy