Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Intelligence for New-Generation Managers: Current Avenues of Development
Business Intelligence for New-Generation Managers: Current Avenues of Development

Executives in Europe have significantly expanded their role in operations – in parallel to their strategic leadership. At the same time, they need to make decisions faster than in the past. In these demanding times, a redesigned Business Intelligence (BI) should support managers in their new roles. This book summarizes...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Geeks On Call PC's: 5-Minute Fixes
Geeks On Call PC's: 5-Minute Fixes
Showing your PC who's boss

PCs have evolved dramatically, and as they've grown more powerful and versatile, they've also become more complex. No doubt there have been times when you were sure the PC was running the show, not you. Geeks On Call can put you back in charge. Here are simple and straightforward ways to understand your PC,...

Essential SQL on SQL Server 2008
Essential SQL on SQL Server 2008

SQLServer® database software is one of the most powerful database engines used today. Microsoft’s latest release of SQLServ er, SQLServer® 2008, is a comprehensive database platform that provides secure and reliable storage for both relational and structured data, enabling one to build and manage high-performance data...

Pro Website Development and Operations: Streamlining DevOps for large-scale websites (Professional Apress)
Pro Website Development and Operations: Streamlining DevOps for large-scale websites (Professional Apress)

Pro Website Development and Operations gives you the experience you need to create and operate a large-scale production website. Large-scale websites have their own unique set of problems regarding their design—problems that can get worse when agile methodologies are adopted for rapid results. Managing large-scale...

Applied Intelligent Control of Induction Motor Drives
Applied Intelligent Control of Induction Motor Drives

Induction motors are the most important workhorses in industry. They are mostly used as constant-speed drives when fed from a voltage source of fixed frequency. Advent of advanced power electronic converters and powerful digital signal processors, however, has made possible the development of high performance, adjustable speed AC motor...

Linux Essentials
Linux Essentials

Learn Linux, and take your career to the next level!

Linux Essentials, 2nd Edition provides a solid foundation of knowledge for anyone considering a career in information technology, for anyone new to the Linux operating system, and for anyone who is preparing to sit for the Linux Essentials Exam. Through...

Agents of Influence: Britain’s Secret Intelligence War Against the IRA
Agents of Influence: Britain’s Secret Intelligence War Against the IRA
Recruited by British Intelligence to infiltrate the IRA and Sinn Féin during the height of the Northern Ireland Troubles, they were ‘agents of influence’. With codenames like INFLICTION, STAKEKNIFE, 3007 and CAROL, these spies played a pivotal role in the fight against Irish republicanism. Now, for the first time,...
Software Measurement and Estimation: A Practical Approach
Software Measurement and Estimation: A Practical Approach
An effective, quantitative approach for estimating and managing software projects
How many people do I need? When will the quality be good enough for commercial sale? Can this really be done in two weeks? Rather than relying on instinct, the authors of Software Measurement and Estimation offer a new, tested approach that includes the
...
Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
Pro Puppet
Pro Puppet

The lives of system administrators and operations staff often revolve around a series of repetitive tasks: configuring hosts, creating users, and managing applications, daemons, and services. Often these tasks are repeated many times in the life cycle of one host, from building to decommissioning, and as new configuration is added or...

Developing B2B Social Communities: Keys to Growth, Innovation, and Customer Loyalty
Developing B2B Social Communities: Keys to Growth, Innovation, and Customer Loyalty

Developing B2B Social Communities: Keys to Growth, Innovation, and Customer Loyalty explains why business-to-business companies need a robust online community strategy to survive and flourish in today’s changing economy and shows you how to design and execute your company’s strategy successfully.

...
unlimited object storage image
Result Page: 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy