Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Excel Timesaving Techniques For Dummies (Computer/Tech)
Excel Timesaving Techniques For Dummies (Computer/Tech)
Covering formulas, charts, data lists, macros, and versions 2000, 2002, and 2003, this book offers more than seventy easy-to-follow techniques that show both new and experienced Excel users how to save time and avoid tedious or redundant tasks. Bestselling author Greg Harvey includes information on customizing Excel's menus and toolbars; modifying...
Enterprise Mac Managed Preferences
Enterprise Mac Managed Preferences

Many systems administrators on the Mac need a way to manage machine configuration after initial setup and deployment. Apple’s Managed Preferences system (also known as MCX) is under-documented, often misunderstood, and sometimes outright unknown by sys admins. MCX is usually deployed in conjunction with an OS X server, but it can also...

Excel 2007 Workbook For Dummies (Computer/Tech)
Excel 2007 Workbook For Dummies (Computer/Tech)
From formulas to functions to the latest features — practice and plan Excel tasks with ease

Confused by Excel? Want to make the most of its capabilities? No worries — this hands-on workbook gets you up to speed in a step-by-step manner. From navigating the new user interface and creating your first spreadsheet to using formulas,...

Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Learn the differences between various log aggregation and correlation systems
  • Examine regulatory and industry requirements
  • Evaluate various deployment scenarios
  • Properly size your deployment
  • Protect the Cisco Security MARS appliance from attack
  • Generate reports,...
Digital Da Vinci: Computers in Music
Digital Da Vinci: Computers in Music

The Digital Da Vinci book series opens with the interviews of music mogul Quincy Jones, MP3 inventor Karlheinz Brandenburg, Tommy Boy founder Tom Silverman and entertainment attorney Jay L. Cooper. A strong supporter of science, technology, engineering and mathematics programs in schools, The Black Eyed Peas founding member will.i.am...

John Locke's Politics of Moral Consensus
John Locke's Politics of Moral Consensus
‘… The book is written in a very accessible and often … punchy way … In its overall thesis that liberalism requires a moral/religious underpinning, the book is very interesting and stimulating.’ Roger Woolhouse, University of York

'… engaging and thought-provoking … To the scholar of Locke,
...
Understanding SOA with Web Services (Independent Technology Guides)
Understanding SOA with Web Services (Independent Technology Guides)

The definitive guide to using Service-Oriented Architecture (SOA) and Web services technologies to simplify IT infrastructure and improve business agility. Renowned experts Eric Newcomer and Greg Lomow offer practical strategies and proven best practices for every facet of SOA planning and implementation. Newcomer and Lomow pick...

Practical Neo4j
Practical Neo4j

Why have developers at places like Facebook and Twitter increasingly turned to graph databases to manage their highly connected big data? The short answer is that graphs offer superior speed and flexibility to get the job done.

It’s time you added skills in graph databases to your toolkit....

C by Example
C by Example
C By Example makes programming easy to learn for the beginning programmer. It builds your programming skills by using clear, easy-to-understand exercises. Hands-on, real world examples show you how to write programs that flow correctly and produce accurate results. At the end of the book, you will use the concepts you have learned to build a...
CCSP SNRS Exam Certification Guide (CCSP Self-Study) (Exam Certification Guide)
CCSP SNRS Exam Certification Guide (CCSP Self-Study) (Exam Certification Guide)

CCSP SNRS Exam Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the SNRS exam. Network security engineers Greg Bastien, Sara Nasseh, and Christian Degu share preparation hints and test-taking tips, helping you identify areas of...

Online Game Pioneers at Work
Online Game Pioneers at Work
In this groundbreaking collection of 15 interviews, successful founders of entertainment software companies reflect on their challenges and how they survived. You will learn of the strategies, the sacrifices, the long hours, the commitment, and the dedication to quality that led to their successes but also of the toll that this incredibly...
unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy