Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Nelson Essentials of Pediatrics, 5E with STUDENT CONSULT Access Fifth Edition(Nelson Essentials of Pediatrics)
Nelson Essentials of Pediatrics, 5E with STUDENT CONSULT Access Fifth Edition(Nelson Essentials of Pediatrics)

Completely revised and updated, this reference of choice for students and practitioners offers practical guidance and the latest information on normal growth and development, along with the diagnosis, management, and prevention of common childhood diseases and disorders. Discussions of the pathophysiologic aspects of pediatric disease, the...

Trauma: Critical Care (Volume 2)
Trauma: Critical Care (Volume 2)

Compiled by internationally recognized experts in trauma critical care,this sourcediscusses the entire gamut of critical care management of the trauma patient and covers several common complications and conditions treated in surgical intensive care units that are not specifically related to trauma.  Utilizing evidence-based guidelines...

Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS
Big Data Analytics with SAS: Get actionable insights from your Big Data using the power of SAS

Leverage the capabilities of SAS to process and analyze Big Data

About This Book

  • Combine SAS with platforms such as Hadoop, SAP HANA, and Cloud Foundry-based platforms for effecient Big Data analytics
  • Learn how to use the web browser-based SAS Studio and iPython Jupyter Notebook...
Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Enterprise Governance of Information Technology: Achieving Alignment and Value in Digital Organizations (Management for Professionals)
Enterprise Governance of Information Technology: Achieving Alignment and Value in Digital Organizations (Management for Professionals)
This book integrates theoretical advances and empirical data on Enterprise Governance in Information Technology (EGIT) with practical applications based on numerous case examples. The third revised edition of Enterprise Governance of Information Technology provides professionals and students with the most recent research advancements as...
Just Enough Project Management: The Indispensable Four-Step Process for Managing Any Project Better, Faster, Cheaper
Just Enough Project Management: The Indispensable Four-Step Process for Managing Any Project Better, Faster, Cheaper
The project-driven approach has proven its value, leading to spectacular results--projects delivered faster and at a more reasonable cost than ever before. Problem is, the project management process used for large projects is too cumbersome and bureaucratic for the projects most of us face, and is often more complex and costly than the problems it...
J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

Information Architecture with XML: A Management Strategy
Information Architecture with XML: A Management Strategy
In the ‘good old days’ before food labelling, sell-by dates and competitive brand promotion,
you placed yourself at the mercy of your local village store manager. After the
painful wait for the previous customer to bid his farewells and finally let attention turn
your way, you placed your trust in the nice old guy who
...
Open Source Development with CVS
Open Source Development with CVS
The need for a modern source-code management strategy in the distributed open-source community is paramount. The benevolent dictatorship model of open-source maintainers is only quasi-stable, but it is far better than the other extreme: the chaos of democratic code development.

The best available compromise is the concurrent versioning system...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Managing Virtual Teams: Getting the Most from Wikis, Blogs, and Other Collaborative Tools
Managing Virtual Teams: Getting the Most from Wikis, Blogs, and Other Collaborative Tools
Virtual collaborative team environments face unique challenges because their communication is not face-to-face. Managing Virtual Teams: Getting the Most from Wikis, Blogs, and Other Collaborative Tools provides practical advice for managers of distributed teams who must design the internal systems and meet deadlines with a diverse team, and for...
unlimited object storage image
Result Page: 586 585 584 583 582 581 580 579 578 577 576 575 574 573 572 571 570 569 568 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy