Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Optics and Photonics: Algorithms, Systems, and Applications
Information Optics and Photonics: Algorithms, Systems, and Applications

This book will address the advances, applications, research results, and emerging areas of optics, photonics, computational approaches, nano-photonics, bio-photonics, with applications in information systems. The objectives are to bring together novel approaches, analysis, models, and technologies that enhance sensing, measurement,...

Knowledge Management (KM) Processes in Organizations: Theoretical Foundations and Practice
Knowledge Management (KM) Processes in Organizations: Theoretical Foundations and Practice
Knowledge Management (KM) is an effort to increase useful knowledge in the organization. It is a natural outgrowth of late twentieth century movements to make organizational management and operations more effective, of higher quality, and more responsive to constituents in a rapidly changing global environment. This document traces...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Guide to Wireless Network Security
Guide to Wireless Network Security

With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,...

Lean Six Sigma Secrets for the CIO: ITIL, COBIT, and Beyond
Lean Six Sigma Secrets for the CIO: ITIL, COBIT, and Beyond

Going beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuble case studies to illustrate how to combine Six Sigma’s rigorous quality principles with Lean methods for uncovering and eliminating waste in your IT processes. Using these methods, the text explains how to take an...

Alfresco 3 Web Services
Alfresco 3 Web Services

Alfresco 3 is the leading open source enterprise content management system that offers powerful features for interacting with the content in its repository from outside the system. These include the support for the Content Management Interoperability Services (CMIS) implementation, reusable web scripts, and a Web Services API.

This...

Practical Goal Programming (International Series in Operations Research & Management Science)
Practical Goal Programming (International Series in Operations Research & Management Science)

The setting and attainment of goals is a fundamental aspect of human decision making, which is manifest in the modern discipline of operational research by the technique of goal programming. Influences from the fields of mathematical programming and multiple criteria decision making (MCDM) can be found in goal programming, and it is...

Linear and Non-Linear Video and TV Applications: Using IPv6 and IPv6 Multicast
Linear and Non-Linear Video and TV Applications: Using IPv6 and IPv6 Multicast

Provides options for implementing IPv6 and IPv6 multicast in service provider networks

New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast identifies five emerging...

Packet Guide to Voice over IP: A system administrator's guide to VoIP technologies
Packet Guide to Voice over IP: A system administrator's guide to VoIP technologies

Go under the hood of an operating Voice over IP network, and build your knowledge of the protocols and architectures used by this Internet telephony technology. With this concise guide, you’ll learn about services involved in VoIP and get a first-hand view of network data packets from the time the phones boot through calls and...

Professional Oracle Programming (Programmer to Programmer)
Professional Oracle Programming (Programmer to Programmer)
Professional Oracle Programming

If you are a developer who wants to use Oracle to build effective, robust, and scalable software applications, look no further. Written by a team of leading authorities on the Oracle database, this example-packed book is divided into three main areas: how the Oracle database works, how to use SQL and programming...

Business Continuity and Disaster Recovery for InfoSec Managers
Business Continuity and Disaster Recovery for InfoSec Managers
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of
...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

unlimited object storage image
Result Page: 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy