Home | Amazing | Today | Tags | Publishers | Years | Search 
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

Statistics for Linguistics with R: A Practical Introduction (Mouton Textbook)
Statistics for Linguistics with R: A Practical Introduction (Mouton Textbook)

This book is the revised and extended second edition of Statistics for Linguistics with R. The comprehensive revision includes new small sections on programming topics that facilitate statistical analysis, the addition of a variety of statistical functions readers can apply to their own data, and a revision of overview sections on statistical...

Performance Driven IT Management: Five Practical Steps to Business Success
Performance Driven IT Management: Five Practical Steps to Business Success

"Despite spending more than $600 billion on information technology over the past decade, the Federal Government has achieved little of the productivity improvements that private industry has realized from IT" according to the 25 Point Implementation Plan to Reform Federal Information Technology Management published by the...

Handbook of Research on Information Security and Assurance
Handbook of Research on Information Security and Assurance

While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest...

Continuous-Time Markov Chains and Applications: A Two-Time-Scale Approach (Stochastic Modelling and Applied Probability)
Continuous-Time Markov Chains and Applications: A Two-Time-Scale Approach (Stochastic Modelling and Applied Probability)

This book gives a systematic treatment of singularly perturbed systems that naturally arise in control and optimization, queueing networks, manufacturing systems, and financial engineering. It presents results on asymptotic expansions of solutions of Komogorov forward and backward equations, properties of functional occupation measures,...

Optical Engineering Fundamentals, Second Edition (SPIE Tutorial Text Vol. TT82)
Optical Engineering Fundamentals, Second Edition (SPIE Tutorial Text Vol. TT82)

This classic Tutorial Text provides a basic understanding of many fundamental optical principles. The second edition has been updated to reflect the development of electronic sensors, as well as the advent of mainstream consumer optical products. Chapters also emphasize the application of state-of-the-art computer software to generate...

How to Negotiate Effectively: Improve Your Success Rate; Get the Best Deal; Achieve Win-Win Results (Creating Success)
How to Negotiate Effectively: Improve Your Success Rate; Get the Best Deal; Achieve Win-Win Results (Creating Success)
From bargaining for a lower price to asking for vacation time, negotiating is a skill essential for improved business performance and better business relationships. In this new edition, David Oliver looks at the vital principles of good negotiation.

The text explores the aspects of negotiating, including: tactics and
...
Weather Matters for Energy
Weather Matters for Energy

It is the purpose of this book to provide the meteorological knowledge and tools to improve the risk management of energy industry decisions, ranging from the long term finance and engineering planning assessments to the short term operational measures for scheduling and maintenance. Most of the chapters in this book are based on...

Spatial Audio Processing: MPEG Surround and Other Applications
Spatial Audio Processing: MPEG Surround and Other Applications

This book collects a wealth of information about spatial audio coding into one comprehensible volume. It is a thorough reference to the 3GPP and MPEG Parametric Stereo standards and the MPEG Surround multi-channel audio coding standard. It describes key developments in coding techniques, which is an important factor in the optimization of...

Web Application Obfuscation
Web Application Obfuscation

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web...

Plants and BioEnergy (Advances in Plant Biology)
Plants and BioEnergy (Advances in Plant Biology)

A country's vision for developing renewable and sustainable energy resources is typically propelled by three important drivers – security, cost, and environmental impact. The U.S. currently accounts for a quarter of the world’s total oil consumption, with domestic demands necessitating – at an ever growing cost – a...

Marine Pollution and Human Health (Issues in Environmental Science and Technology)
Marine Pollution and Human Health (Issues in Environmental Science and Technology)
There is growing concern about the state of the world's oceans. The rapid growth of human populations in coastal regions has led to increasing dependence on marine resources. Beneficial features related to food supply and life style need to be balanced against the hazards presented by microbial pathogens, chemical pollutants, and toxic algal...
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy