Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Risk Management
Practical Risk Management
In early 1995 people were glued to their television sets watching the aftermath of a very large earthquake in the city of Kobe in western Japan. Little did they suspect the deep-seated implications of this event on the financial markets in general, and on the Bank of England in particular. The earthquake caused a major sell-off in the already...
Collaborate or Perish!: Reaching Across Boundaries in a Networked World
Collaborate or Perish!: Reaching Across Boundaries in a Networked World

In Collaborate or Perish! former Los Angeles police chief and New York police commissioner William Bratton and Harvard Kennedy School’s Zachary Tumin lay out a field-tested playbook for collaborating across the boundaries of our networked world. Today, when everyone is connected, collaboration is the game changer. Agencies and...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
"In the near future, someone will build a better Enron–a legitimate company with the means and integrity to revolutionize markets. That person will want to use Corporate Aftershock as his business manual and had better hope that government regulators are reading it as well."

–Ross M. Miller, author, Paving Wall...

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign...
Adobe Acrobat 7 in the Office
Adobe Acrobat 7 in the Office
Offering a raft of Microsoft Office collaboration features (plus the ability to review and comment on Acrobat Procreated documents using just Reader), Acrobat is no longer just for pre-press and creative professionals. Acrobat can simplify workflows in all kinds of business settings. All you need is this handy guide to delineate those uses and show...
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Information Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent...
Managing Web Service Quality: Measuring Outcomes and Effectiveness (Premier Reference Source)
Managing Web Service Quality: Measuring Outcomes and Effectiveness (Premier Reference Source)
Web services are increasingly important in information technology with the expansive growth of the Internet. As services proliferate in domains ranging from e-commerce to digital government, the need for tools and methods to measure and guide the achievement of quality outcomes is critical for organizations.

Managing Web Service...

Adobe Photoshop 7 Creative Workshop (One Off)
Adobe Photoshop 7 Creative Workshop (One Off)
Unleash your creativity with Adobe ®Photoshop® 7 Creative Workshop! Produce professional-quality images for print, the Web, and anywhere else using the tools of Adobe Photoshop. This brilliant four-color book is arranged in workshops that will serve as real-world tutorials. Through these projects, you’ll learn to create, edit, and...
Insider Threats in Cyber Security (Advances in Information Security)
Insider Threats in Cyber Security (Advances in Information Security)

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Web as History: Using Web Archives to Understand the Past and the Present
Web as History: Using Web Archives to Understand the Past and the Present
The World Wide Web has now been in use for more than 20 years. From early browsers to today’s principal source of information, entertainment and much else, the Web is an integral part of our daily lives, to the extent that some people believe ‘if it’s not online, it doesn’t exist.’ While this statement is not...
unlimited object storage image
Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy