Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Web Information Systems and Technologies: International Conferences WEBIST 2005 and WEBIST 2006, Revised Selected Papers
Web Information Systems and Technologies: International Conferences WEBIST 2005 and WEBIST 2006, Revised Selected Papers
This book contains the best papers from the first two instances of the International Conference on Web Information Systems and Technologies (WEBIST 2005 and 2006), organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) in collaboration with the OMG (Object Management Group), held in Miami (USA)...
Google Apps For Dummies (Computer/Tech)
Google Apps For Dummies (Computer/Tech)
Google Apps are Web-based, low-cost (or free!) office productivity tools that do everything those expensive applications do — and you can access them from any computer with an Internet connection. Google Apps For Dummies boosts your "app-titude" by giving you the low-down on choosing, setting up, and using these nifty and...
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,...
Book of Numbers
Book of Numbers

This book, more than any other I’ve written up to this point in my life, was a labor of love. It allowed me to combine the knowledge and experience of two careers (over a decade in government and law enforcement, and close to another decade in the computer field, encompassing almost 20 years of working with computers as a hobbyist).When...

Parallel Programming in OpenMP
Parallel Programming in OpenMP
"This book will provide a valuable resource for the OpenMP community."

- Timothy G. Mattson, Intel Corporation

"This book has an important role to play in the HPC community-both for introducing practicing professionals to OpenMP and for educating students and professionals about parallel programming. I'm happy...

Expert Systems: Principles and Programming, Third Edition
Expert Systems: Principles and Programming, Third Edition

This book combines coverage of expert systems theory with coverage of practical applications using CLIPS, an expert systems shell widely used in government, industry, and education. The result is a self-contained book and CD-ROM package for computer science, engineering, and CIS/MIS students and professionals that provides the conceptual...

Mastering Data Warehouse Aggregates: Solutions for Star Schema Performance
Mastering Data Warehouse Aggregates: Solutions for Star Schema Performance
The first book to offer in-depth coverage of star schema aggregate tables

 

Dubbed by Ralph Kimball as the most effective technique for maximizing star schema performance, dimensional aggregates are a powerful and efficient tool that can accelerate data warehouse queries more dramatically than any other technology. After you ensure...

Marketing Your Consulting Services : A Business of Consulting Resource
Marketing Your Consulting Services : A Business of Consulting Resource
"Elaine Biech keeps her promises. Just open Marketing Your Consulting Services to the preface, and you see that she promises practical. Then she immediately delivers— on the very same page! Flip to any page, and the same is true. That's a stunning achievement. And Elaine's advice works. I tried one of her first fourteen...
Research Directions in Data and Applications Security XVIII
Research Directions in Data and Applications Security XVIII

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and...

Business Continuity and Disaster Recovery for InfoSec Managers
Business Continuity and Disaster Recovery for InfoSec Managers
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of
...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

unlimited object storage image
Result Page: 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy