Home | Amazing | Today | Tags | Publishers | Years | Search 
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

Implement an Effective Security Metrics Project or Program

IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the...

The Excel Analyst's Guide to Access
The Excel Analyst's Guide to Access

The ultimate handbook for Excel analysts who need reporting solutions using Access

Excel and Access are intended to work together. This book offers a comprehensive review of the extensive analytical and reporting functionality that Access provides and how it enhances Excel reporting functions.

Sales managers, operations...

Executive's Guide to Cloud Computing
Executive's Guide to Cloud Computing

Your organization can save and thrive in the cloud with this first non-technical guide to cloud computing for business leaders

In less than a decade Google, Amazon, and Salesforce.com went from unknown ideas to powerhouse fixtures in the economic landscape; in even less time offerings such as Linkedin, Youtube, Facebook,...

Smart Data: Enterprise Performance Optimization Strategy
Smart Data: Enterprise Performance Optimization Strategy

This book is written for enterprise executives and addresses the single most important activity for which they are ultimately responsible—optimization of performance. Whether you are an executive of government or commercial enterprise, or any other organization, your primary aim is to maximize return from limited resources to accomplish...

Computational Fluid Mechanics
Computational Fluid Mechanics

This volume presents recent advances in computational fluid dynamics. The topics range from fundamentals and computational techniques to a wide variety of applications in astronomy, applied mathematics and meteorology. They describe recent calculations in direct numerical simulation of turbulence, applications of turbulence modelling of...

Spring Python 1.1
Spring Python 1.1

Spring Python captures the concepts of the Spring Framework and Spring Security and brings them to the world of Python and provides many functional parts to assemble applications. Spring Python is all about using the many useful features of Spring to the fullest and making these features available when working with Python.

Get to...

Operative Urology: At the Cleveland Clinic
Operative Urology: At the Cleveland Clinic

More than fifty full-time urological clinicians and surgeons from the internationally acclaimed Cleveland Clinic Glickman Urological Institute describe the most common as well as the most innovative urological procedures from the standpoint of the state-of-the-art, as it is practiced at one of the world's top institutions. Their...

Matrices and Transformations
Matrices and Transformations

Text stresses use of matrices in study of transformations of the plane. Familiarizes reader with role of matrices in abstract algebraic systems and illustrates its effective use as mathematical tool in geometry. Includes proofs of most theorems. Answers to odd-numbered exercises.

MATRIX ALGEBRA is a significant topic in...

Laptops All-in-One For Dummies
Laptops All-in-One For Dummies

The all-in-one guide to buying, using, securing, and transporting a laptop—it's ten books in one!

If you want to take a computer with you on a trip, to a coffee shop, or into the kitchen when you're cooking, laptops are just the ticket.  They're portable, powerful, and popular—but they're not...

Wireless Mobility: The Why of Wireless (Networking Professional's Library)
Wireless Mobility: The Why of Wireless (Networking Professional's Library)

Comprehensive Answers to the "Why" of Wireless Mobility

In this unique guide, Cisco wireless expert Neil Reid incorporates best practices from some of the most complex and challenging wireless deployments in the industry and provides an insider's view of the "why" of wireless mobility. The book discusses...

Cyber Terrorism: A Guide for Facility Managers
Cyber Terrorism: A Guide for Facility Managers

In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and...

The H.264 Advanced Video Compression Standard
The H.264 Advanced Video Compression Standard

H.264 Advanced Video Coding or MPEG-4 Part 10 is fundamental to a growing range of markets such as high definition broadcasting, internet video sharing, mobile video and digital surveillance. This book reflects the growing importance and implementation of H.264 video technology. Offering a detailed overview of the system, it explains the...

Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy