Home | Amazing | Today | Tags | Publishers | Years | Search 
CISSP Training Kit
CISSP Training Kit

Your 2-in-1 Self-Paced Training Kit

EXAM PREP GUIDE

Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying
...

Diagnosing Wild Species Harvest: Resource Use and Conservation
Diagnosing Wild Species Harvest: Resource Use and Conservation

Diagnosing Wild Species Harvest bridges gaps of knowledge fragmented among scientific disciplines as it addresses this multifaceted phenomenon that is simultaneously global and local. The authors emphasize the interwoven nature of issues specific to the ecological, economic, and socio-cultural realms of wild species harvest.

...

Institutionalization of UX: A Step-by-Step Guide to a User Experience Practice (2nd Edition)
Institutionalization of UX: A Step-by-Step Guide to a User Experience Practice (2nd Edition)

Computer hardware no longer provides a competitive edge. Software has become a broadly shared commodity. A new differentiator has emerged in information technology: user experience (UX). Executives recognize that the customer satisfaction that applications and websites provide directly impacts a company’s stock price.

...
At Your Service: Service-Oriented Computing from an EU Perspective (Cooperative Information Systems)
At Your Service: Service-Oriented Computing from an EU Perspective (Cooperative Information Systems)

Service-Oriented Applications and Architectures (SOAs) have captured the interest of industry as a way to support business-to-business interaction, and the SOA market grew by $4.9 billion in 2005. SOAs and in particular service-oriented computing (SOC) represent a promising approach in the development of adaptive distributed systems. With...

Essential Tools for Management Consulting: Tools, Models and Approaches for Clients and Consultants
Essential Tools for Management Consulting: Tools, Models and Approaches for Clients and Consultants

The second book in the Essential Tools For series… on the topic of Management Consulting

Based on Simon Burtonshaw-Gunn's successful The Essential Management Toolbox, this book focuses in greater depth on the topic of Management Consulting. This second book looks at how a management consultant needs...

Above the Clouds: Managing Risk in the World of Cloud Computing
Above the Clouds: Managing Risk in the World of Cloud Computing

Interested in ways to make your business more efficient? Then Cloud Computing may be just what you have been looking for. Cloud Computing can enable you to drive down the costs of your IT function and gives you the ability to focus on your core business, whilst saving energy. The concept of shifting computing to a shared service provider is...

Building a High-Performance Team
Building a High-Performance Team

This book is intended to provide IT managers with practical advice and tips on how to create a high-performance team.

IT managers’ work cannot be achieved without collaboration and teamwork. Whether leading a team, or working as a team member or part of a cross-functional team, the successful implementation of IT projects...

Agile Oracle Application Express
Agile Oracle Application Express

Before Oracle Application Express (APEX) can be discussed in the light of Agile software development, the stage must be set by defining, for the purposes of this book, what is meant by Agile software development.

This chapter introduces you to the core principles of Agile software development. The core principles were...

Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications
Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications

This publication offers and investigates efficient Monte Carlo simulation methods in order to realize a Bayesian approach to approximate learning of Bayesian networks from both complete and incomplete data. For large amounts of incomplete data when Monte Carlo methods are inefficient, approximations are implemented, such that learning remains...

Combinatorial Optimization: Methods and Applications: Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security
Combinatorial Optimization: Methods and Applications: Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security

This book is a collection of six articles arising from the meeting of the NATO Advanced Study Institute (ASI) ''Combinatorial Optimization: Methods and Applications,'' which was held at the University of Montreal in June 2006. This ASI consisted of seven series of five one-hour lectures and one series of four one-hour...

Coding Freedom: The Ethics and Aesthetics of Hacking
Coding Freedom: The Ethics and Aesthetics of Hacking

Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source...

Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
The evolution of managing Cloud Computing Services in principles and practices provided by the best practices IT Service Management framework provides the more holistic guidance needed for an industry that continues to mature and develop at a rapid pace.

Many organizations and individuals who had previously struggled
...
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy