Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)

This book provides a complete and comprehensive overview of 3G UMTS charging services

Evolving from offline billing of traditional telecommunications, charging for IP services in mobile networks is challenging; charging convergence is one of the major trends in the telecom industry. Advanced mobile...

Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
Managing the Risks of Payments Systems
Managing the Risks of Payments Systems
Identify and manage payment risk

The risks of payment systems have dramatically evolved…new laws, new technologies, new threats combined with the chronic problems of error, fraud, and security. Treasury and banking executives and their counsel ignore these risks at their peril. "We didn’t know" is no excuse.

...
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
This book presents a total systems approach to the all the topics needed for the infosec professional, beginning with defining the position of the information systems security officer (ISSO), to establishing and managing an infosec program.

* Six new chapters present the latest information and resources to counter information security
...
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
"In the near future, someone will build a better Enron–a legitimate company with the means and integrity to revolutionize markets. That person will want to use Corporate Aftershock as his business manual and had better hope that government regulators are reading it as well."

–Ross M. Miller, author, Paving Wall...

Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption
Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption
Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption is written for members of boards of directors and audit committees, senior executives, those who advise or report to them, and those responsible for managing fraud and corruption risks. It describes in plain English terms a proactive fraud and corruption risk...
Financial Statement Fraud: Strategies for Detection and Investigation (Wiley Corporate F&A)
Financial Statement Fraud: Strategies for Detection and Investigation (Wiley Corporate F&A)

Valuable guidance for staying one step ahead of financial statement fraud

Financial statement fraud is one of the most costly types of fraud and can have a direct financial impact on businesses and individuals, as well as harm investor confidence in the markets. While publications exist on financial statement fraud and roles...

The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The effective management of risks online is likely to be the greatest business enabler / destroyer of the next decade. Clearly, organizations that do not move to full e-commerce functionality are unlikely to flourish; whereas those that ignore cyber crime and the "dark side" of the Internet are likely to get badly burnt.

This...

Web Security, Privacy and Commerce, 2nd Edition
Web Security, Privacy and Commerce, 2nd Edition
The World Wide Web has changed our world. More than half the people in the United States now use the Web on a regular basis. We use it to read today's news, to check tomorrow's weather, and to search for events that have happened in the distant past. And increasingly, the Web is the focus of the 21st century...
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
With the increasing concerns on security breaches and transaction fraud, highly reliable and convenient personal verification and identification technologies are more and more requisite in our social activities and national services. Biometrics, used to recognize the identity of an individual, are gaining ever-growing popularity in an extensive...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy