Home | Amazing | Today | Tags | Publishers | Years | Search 
Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
Business rules engines can make organizations more agile by allowing them to manage diverse sets of operating rules, such as many different contracts for goods and services with different clients. For example, business rules engines can contain interfaces that allow users to define business rules to add specific functionality to software...
Changing Software Development: Learning to Become Agile
Changing Software Development: Learning to Become Agile

“Successful companies have known the importance of continuous change and learning for a long time; this is the first book that describes these concepts in an organic way in the context of software development. A must read for everybody involved in this business.”

Giovanni Asproni, Director, Asprotunity...

Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
The loss of sensitive data continues to be a signifi cant concern for both organizations as well as individuals whose information may be at risk of a breach. Organizations that experience a data breach can suffer reputational damage, loss of customer and constituent confi dence, legal and regulatory scrutiny, and the direct costs of managing an...
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
No two data quality projects are the same. Some are large efforts focused entirely on improving some quality aspect of information. Others are subprojects within other efforts, such as a data migration. Still others are led by a few individuals trying to make a difference as they perform their everyday activities. What I like about McGilvray's Ten...
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
A Beginner's Guide to Gambas: Programming
A Beginner's Guide to Gambas: Programming
A Beginner's Guide to Gambas is the first definitive reference for the Linux-based Gambas programming language. Gambas ships with a graphical development environment based on the Basic programming language. It supports object-oriented programming and is similar to Microsoft's Visual Basic product. Gambas uses the Qt toolkit and supports other...
Creative Environments: Issues of Creativity Support for the Knowledge Civilization Age (Studies in Computational Intelligence)
Creative Environments: Issues of Creativity Support for the Knowledge Civilization Age (Studies in Computational Intelligence)
Creative Environments is a follow-up on the book Creative Space in the same series and by the same authors, serving this time as editors of a broader book on computational intelligence and knowledge engineering tools for supporting knowledge creation. This book contains four parts. The first part presents a further development of models of...
Grid Computing: The Savvy Manager's Guide (The Savvy Manager's Guides)
Grid Computing: The Savvy Manager's Guide (The Savvy Manager's Guides)
"This book explains grid in simple terms, using practical examples to demonstrate the technical and business benefits of grid and providing hands-on guidance for readers. This is a must read for everyone who is seriously investigating grid or planning to integrate grid technology in their IT environment."
--Wolfgang Gentzsch,
...
Smart Graphics: 9th International Symposium, SG 2008, Rennes, France, August 27-29, 2008, Proceedings
Smart Graphics: 9th International Symposium, SG 2008, Rennes, France, August 27-29, 2008, Proceedings
For centuries, artists and designers have been creating communicative graphics. With the advent of new forms of media, the emergence of paradigms such as ubiquitous computing, and the rapid evolution of interaction devices, there is a continuous cycle of renewal of the technologies and methods to support artists, interaction designers and...
Web-Weaving: Intranets, Extranets, and Strategic Alliances
Web-Weaving: Intranets, Extranets, and Strategic Alliances
Intranets and Extranets are the fastest growing use of internet technology and are being adopted by a large number of organizations. `Web-Weaving' is a book for managers which illustrates the benefits and pitfalls of using technology to enhance internal and external connections. The book brings together a number of the hottest subjects in IT and...
IS Management Handbook, 8th Edition
IS Management Handbook, 8th Edition
The first few years of the new millennium have been a challenging time for the information technology (IT) manager. The initial economic euphoria that greeted the successful completion of Y2K projects worldwide was quickly followed by a dramatic shakedown within U.S.-based industries most closely related to the growth of the Internet. Today,...
Result Page: 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy