Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Corporate Governance and Diversity in Boardrooms: Empirical Insights into the Impact on Firm Performance
Corporate Governance and Diversity in Boardrooms: Empirical Insights into the Impact on Firm Performance

This book explores diversity in boardrooms to highlight the link between the heterogeneous dimensions of board diversity and their impact on the firms. The book provides a brief definition of corporate governance and focuses on the role and functions of the board of directors. The work contributes to the literature enriching the...

Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Mastering Bitcoin: Unlocking Digital Cryptocurrencies

Mastering Bitcoin is essential reading for everyone interested in learning about bitcoin basics, the technical operation of bitcoin, or if you're building the next great bitcoin killer app or business. From using a bitcoin wallet to buy a cup of coffee, to running a bitcoin marketplace with hundreds of thousands of transactions, or...

Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam

Get certified as an Azure architect by acing the 70-535 Architecting Microsoft Solutions (70-535) exam using this comprehensive guide with full coverage of the exam objectives

Key Features

  • Learn to successfully design and architect powerful solutions on the Azure Cloud platform
  • ...
Practical Big Data Analytics: Hands-on techniques to implement enterprise analytics and machine learning using Hadoop, Spark, NoSQL and R
Practical Big Data Analytics: Hands-on techniques to implement enterprise analytics and machine learning using Hadoop, Spark, NoSQL and R

Get command of your organizational Big Data using the power of data science and analytics

Key Features

  • A perfect companion to boost your Big Data storing, processing, analyzing skills to help you take informed business decisions
  • Work with the best tools such as Apache...
Microsoft SQL Server 2014 Business Intelligence Development Beginners Guide
Microsoft SQL Server 2014 Business Intelligence Development Beginners Guide

Get to grips with Microsoft Business Intelligence and data warehousing technologies using this practi cal guide

About This Book

  • Discover the Dimensional Modeling concept while designing a data warehouse
  • Learn Data Movement based on technologies such as SSIS, MDS, and DQS
  • ...
Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

The Chief Information Security Officer
The Chief Information Security Officer

The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...

  • Learn how the role...
New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
This book provides a platform for discussing the challenges that organizations face in order to implement sustainability, ethics, and effective corporate governance, all of which are important elements of “standing out” from other companies. Examining the background of the New European Consensus on development with the new...
unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy