Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Microsoft SQL Server 2014 Business Intelligence Development Beginners Guide
Microsoft SQL Server 2014 Business Intelligence Development Beginners Guide

Get to grips with Microsoft Business Intelligence and data warehousing technologies using this practi cal guide

About This Book

  • Discover the Dimensional Modeling concept while designing a data warehouse
  • Learn Data Movement based on technologies such as SSIS, MDS, and DQS
  • ...
Disciplined Agile Delivery: A Practitioner's Guide to Agile Software Delivery in the Enterprise (IBM Press)
Disciplined Agile Delivery: A Practitioner's Guide to Agile Software Delivery in the Enterprise (IBM Press)

Master IBM’s Breakthrough DAD Process Framework for Succeeding with Agile in Large, Complex, Mission-Critical IT Projects

 

It is widely recognized that moving from traditional to agile approaches to build software solutions is a critical...

Lean Six Sigma Secrets for the CIO: ITIL, COBIT, and Beyond
Lean Six Sigma Secrets for the CIO: ITIL, COBIT, and Beyond

Going beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuble case studies to illustrate how to combine Six Sigma’s rigorous quality principles with Lean methods for uncovering and eliminating waste in your IT processes. Using these methods, the text explains how to take an...

Hybrid Cloud Management with Red Hat CloudForms
Hybrid Cloud Management with Red Hat CloudForms

Build, manage, and control an open hybrid cloud infrastructure using Red Hat CloudForms

About This Book

  • Understand the infrastructure management capabilities through monitoring and tracking techniques
  • Control the hybrid cloud infrastructure using policies and define actions based on...
Data Warehousing in the Age of Big Data (The Morgan Kaufmann Series on Business Intelligence)
Data Warehousing in the Age of Big Data (The Morgan Kaufmann Series on Business Intelligence)

Web 2.0 has changed the way we conduct business, interact with customers, share information with friends and family, measure success in terms of business revenue and customer wallet share, and define brand management, and, most importantly, it has created a revenue channel like none other. Whether you plan your vacation, buy the newest...

Actionable Intelligence: A Guide to Delivering Business Results with Big Data Fast!
Actionable Intelligence: A Guide to Delivering Business Results with Big Data Fast!

Building an analysis ecosystem for a smarter approach tointelligence

Keith Carter's Actionable Intelligence: A Guide to DeliveringBusiness Results with Big Data Fast! is the comprehensive guideto achieving the dream that business intelligence practitionershave been chasing since the concept itself came into being....

Governance, Risk, and Compliance Handbook for Oracle Applications
Governance, Risk, and Compliance Handbook for Oracle Applications
  • Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
  • Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
  • ...
CISSP All-in-One Exam Guide, 6th Edition
CISSP All-in-One Exam Guide, 6th Edition

A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris

Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by...

Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
Putting Investors First: Real Solutions for Better Corporate Governance
Putting Investors First: Real Solutions for Better Corporate Governance

Written in a practical and succinct style, Putting Investors First is indispensable for board members and the corporate executives who work with them and of compelling interest to large and small investors who have lost faith in our system of corporate governance.

Demands on the boards of directors of public companies throughout...

CISSP Training Kit
CISSP Training Kit

Your 2-in-1 Self-Paced Training Kit

EXAM PREP GUIDE

Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying
...

Result Page: 21 20 19 18 17 16 15 14 13 12 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy