Traditionally, human resources has focused on recruiting good people, preparing them for assignments, motivating them to perform, and retaining them. These functions remain essential, but to be successful in turbulent times like ours, human capital strategy needs to be broader and much more far-reaching. High-Impact Human Capital Strategy...
Inside Java(TM) 2 Platform Security, the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java...
Translational research looks to take the latest innovations made in the laboratory setting to translate findings into effective and sustainable medical interventions and improved preventative measures. Funding support is increasingly tied to practical healthcare outcomes, with this trend likely only to increase in coming years,...
A human observer is able to recognize the color of objects irrespective of the light used to illuminate the objects. This ability is called color constancy. In photography, color constancy is known under the name white balance. Most amateur photographers have probably experienced the following problem at one time or another when a photograph is...
SAP HANA is SAP's in-memory database technology, and the focal point of their next generation strategy. Using column-based storage to provide highly compressed and rapidly accessed data, a SAP HANA application can be several hundred times faster than the same application on previous generation database technology.
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001) ...
A step-by-step guide to using computational tools to solve problems in cell biology
Combining expert discussion with examples that can be reproduced by the reader, this text introduces an array of informatics tools that are available for analyzing biological data and modeling cellular processes. You learn to fully leverage public databases and...
Get the skills you need to solve problems and equations and be ready for algebra class
Whether you're a student preparing to take algebra or a parent who wants to brush up on basic math, this fun, friendly guide has the tools you need to get in gear. From positive,...
In 1862, the gardener James Bateman sent several specimens of the Christmas
orchid to Charles Darwin. This orchid was first planted in Britain in 1855 and it did
not blossom until 1857. It had been discovered several decades before by the
French botanist Louis-Marie Aubert du Petit-Thouars in Madagascar in 1822. The
most significant...
Agile methodologies attack risk at its core. To identify risk early and often is the
premise of agile security. Risk comes in many forms. Organizations face security
threats every day. Risks are in the delivery and maintenance of the countermeasures.
Agile IT Security focuses on the details of the steps in delivering and maintaining...
Java and databases make a powerful combination. Getting the two sides to work together, however, takes some effort--largely because Java deals in objects while most databases do not.This book describes the standard Java interfaces that make portable object-oriented access to relational databases possible and offers a robust model for writing...