Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.
From there, you will learn about the basic client/server architecture of the server, and you will
get a detailed description of the HTTP request/response headers. You will learn the client/server
model in straightforward and simple terms, and throughout the book, you will learn about
several methods for keeping track of the state of...
This graduate-level textbook elucidates low-risk and fail-safe systems in mathematical detail. It addresses, in particular, problems where mission-critical performance is paramount, such as in aircraft, missiles, nuclear reactors and weapons, submarines, and many other types of systems where “failure” can result in...
This book focuses on the evaluation of delegated and implementing rule-making, based on Articles 290 and 291 TFEU. These articles have attracted considerable attention since their introduction in 2009, and their implementation is one of the most hotly debated questions in European Administrative Law. The book takes up this...
This book discusses how to build optimization tools able to generate better future studies. It aims at showing how these tools can be used to develop an adaptive learning environment that can be used for decision making in the presence of uncertainties. The book starts with existing fuzzy techniques and multicriteria decision making...
This book provides an overview of various application spheres and supports further innovations needed in information management and in the processes of knowledge generation. The professions, organizations and scientific associations involved are unusually challenged by the complexity of the data situation.
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.
Learn to program the Propeller in Spin and C and how to map the Propeller Assembler (PASM) language from other high-level languages you might know.
The overall task you will pursue in the book is to implement a Delta Compression algorithm: first in Spin, then in PASM, then in C. Along the way, you'll review...
Discover how to use the popular RStudio IDE as a professional tool that includes code refactoring support, debugging, and Git version control integration. This book gives you a tour of RStudio and shows you how it helps you do exploratory data analysis; build data visualizations with ggplot; and create custom R packages and...
Why do so many scorecard projects fail? Why do managers treat information as a source of power to be protected, instead of an asset to be exploited? Clearly there has to be a better way of managing perfomance. After witnessing countless initiatives fail, Oracle thought leader and former Gartner analyst Frank Buytendijk challenges conventional...
Know how your company can accelerate growth by not only tapping into new growth vectors, but also by adapting its organization, culture, and processes.
To oversee growth from an idea to a company with billions in revenue, CEOs must reinvent many aspects of their company in anticipation of it reaching ever-higher revenues....