Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Profit Impact of Business Intelligence
The Profit Impact of Business Intelligence
Business Intelligence (BI): Its not just a technology. Its not just a methodology. Its a powerful new management approach that when done right can deliver knowledge, efficiency, better decisions, and profit to almost any organization that uses it.

When BI first came on the scene, it promised a lot but often failed to deliver. The
...
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is...

Functional and Object Oriented Analysis and Design: An Integrated Methodology
Functional and Object Oriented Analysis and Design: An Integrated Methodology
Functional and Object Oriented Analysis and Design: An Integrated Methodology teaches students of information systems, software engineering, computer science and related areas how to analyze and design information systems using the FOOM methodology. FOOM combines the object-oriented approach and the functional (process-oriented) approach. It...
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications...
Research Methods in Legal Translation and Interpreting: Crossing Methodological Boundaries (Law, Language and Communication)
Research Methods in Legal Translation and Interpreting: Crossing Methodological Boundaries (Law, Language and Communication)

The field of Legal translation and interpreting has strongly expanded over recent years. As it has developed into an independent branch of Translation Studies, this book advocates for a substantiated discussion of methods and methodology, as well as knowledge about the variety of approaches actually applied in the field. It is argued...

Apple Training Series : Mac OS X Support Essentials (2nd Edition)
Apple Training Series : Mac OS X Support Essentials (2nd Edition)
The only Apple-certified book on Mac OS X, this updated best-seller will take you deep inside the latest big-cat operating system, covering everything from networking technologies to system administration, customizing the operating system, command-line programming, and more. Whether you're a support technician or simply an ardent Mac user, you'll...
Managing in the Email Office (Computer Weekly Professional)
Managing in the Email Office (Computer Weekly Professional)
Managing the Email Office is for all people who feel email is taking over their lives. It provides practical help and guidance on how to manage both their own volume of email as well as their organization's. It will enable you to develop winning ways with email and to re-claim some of those valuable resources which email...
A Practical Guide for SystemVerilog Assertions
A Practical Guide for SystemVerilog Assertions
When Gateway Design Automation, Inc. created Verilog in the mid- 1980's, the process of integrated circuit design was very different than it is today. The role of Verilog, as well as its capability, has evolved since its inception into today's SystemVerilog.

SystemVerilog language consists of three categories of...

Cisco IP Routing Protocols: Troubleshooting Techniques
Cisco IP Routing Protocols: Troubleshooting Techniques

Cisco IP Routing Protocols: Troubleshooting Techniques is a comprehensive reference guide for network professionals facing problems with implementing and configuring IP routing protocols. It begins with an explanation of troubleshooting methodologies and tools, including Cisco and TCP/IP diagnostic commands and basic protocol...

Managing Software Deliverables, First Edition : A Software Development Management Methodology
Managing Software Deliverables, First Edition : A Software Development Management Methodology

Managing Software Deliverables—A Software Development Management Methodology describes a set of proven processes for establishing an effective Software Program Management Office (SPMO) function in a corporate setting. Every business that has people performing Software Project Management (PM) activities has a need for these...

Perl Medic : Transforming Legacy Code
Perl Medic : Transforming Legacy Code
Bring new power, performance, and scalability to your existing Perl code!

Today's Perl developers spend 60-80% of their time working with existing Perl code. Now, there's a start-to-finish guide to understanding that code, maintaining it, updating it, and refactoring it for maximum performance and reliability. Peter J. Scott, lead author of...

Getting Started With SAS Enterprise Miner 5.2
Getting Started With SAS Enterprise Miner 5.2
SAS defines data mining as the process of uncovering hidden patterns in large amounts of data. Many industries use data mining to address business problems and opportunities such as fraud detection, risk and affinity analyses, database marketing, householding, customer churn, bankruptcy prediction, and...
unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy