Home | Amazing | Today | Tags | Publishers | Years | Search 
100 SOA Questions: Asked and Answered
100 SOA Questions: Asked and Answered

100 SOA Questions brings together authoritative answers to the most crucial questions business, technical, and architectural decision-makers ask about SOA. It draws on the immense experience of two SOA experts who’ve participated in more than 100 SOA projects in the roles of architect, designer,...

E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

Cyber Risks for Business Professionals: A Management Guide
Cyber Risks for Business Professionals: A Management Guide

The benefits which Internet technologies offer to business professionals also present considerable risks. The management of these risks is the focus of this book.

Realize the benefits of Internet technologies, while ensuring your company is protected from the associated risks!

An effective risk management...

Computer Forensics: A Pocket Guide
Computer Forensics: A Pocket Guide

Computer forensics has become an essential tool in the identification of misuse and abuse of systems. Whilst widely utilised within law enforcement, the rate of adoption by organisations has been somewhat slower, with many organisations focusing upon the traditional security countermeasures to prevent an attack from occurring in the first...

CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

The industry-leading study guide for the CISA exam, fully updated

More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated...

Agile Software Requirements: Lean Requirements Practices for Teams, Programs, and the Enterprise
Agile Software Requirements: Lean Requirements Practices for Teams, Programs, and the Enterprise

In the past decade, the movement to lighter-weight and increasingly agile methods has been the most significant change to affect the software enterprise since the advent of the waterfall model in the 1970s. Originated by a variety of thought and practice leaders and proven in real-world, successful experiments, the methods have proven...

Data Integration Blueprint and Modeling: Techniques for a Scalable and Sustainable Architecture
Data Integration Blueprint and Modeling: Techniques for a Scalable and Sustainable Architecture

Making Data Integration Work: How to Systematically Reduce Cost, Improve Quality, and Enhance Effectiveness

 

Today’s enterprises are investing massive resources in data integration. Many possess thousands of point-to-point data...

Green IT in Practice
Green IT in Practice

There is a scientific consensus that we need to act rapidly to cut carbon dioxide emissions if we are to limit the most extreme effects of climate change. The IT sector is in a unique position to act as a catalyst for this change. By implementing simple efficiencies, the sector can reduce its carbon footprint – which currently...

Auditing Social Media: A Governance and Risk Guide
Auditing Social Media: A Governance and Risk Guide

As I look back on my career at Microsoft, I feel fortunate to have had a front-row seat to witness an incredible shift in how people and organizations communicate and interact. I started at Microsoft in October 1994—about a year after America Online released AOL 1.0 for Windows. As early adopters of social media,...

SOA for Profit, A Manager's Guide to Success with Service Oriented Architecture
SOA for Profit, A Manager's Guide to Success with Service Oriented Architecture

Service-Oriented Architecture is becoming the leading architecture for IT, and it is changing the way organisations work. IT is slowly but steadily gaining maturity, and becoming the flexible yet stable and reliable support for business it should be. At the same time, IT is regaining its potential to create real business innovation. SOA will...

The Chief Information Security Officer
The Chief Information Security Officer

The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...

  • Learn how the role...
Managing Oracle Fusion Applications (Oracle Press)
Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole new level. Whether you’re in the IT department, a systems integrator, a business leader, or an end user, Fusion Applications has more of what you need, less of what you don’t, and some of what you didn’t even think possible.
...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy