Home | Amazing | Today | Tags | Publishers | Years | Search 
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Enterprise Service Computing: From Concept to Deployment
Enterprise Service Computing: From Concept to Deployment

The developed economy is shifting from being manufacturing based to services based. Different from the traditional manufacturing business, the services business is more complicated and dynamic, and end-user driven rather than product driven. To stay competitive, an enterprise thus has to rethink its business strategies and revamp its...

Agile Software Requirements: Lean Requirements Practices for Teams, Programs, and the Enterprise
Agile Software Requirements: Lean Requirements Practices for Teams, Programs, and the Enterprise

In the past decade, the movement to lighter-weight and increasingly agile methods has been the most significant change to affect the software enterprise since the advent of the waterfall model in the 1970s. Originated by a variety of thought and practice leaders and proven in real-world, successful experiments, the methods have proven...

Implementing Application Frameworks: Object-Oriented Frameworks at Work
Implementing Application Frameworks: Object-Oriented Frameworks at Work

This book is for anyone who wants to implement large-scale software reuse through object-oriented (00) application frameworks. Its purpose is to help the reader understand one of the hottest technologies related to software reuse-frameworks-and provide guidelines for making decisions about this technology. Decision makers such as...

Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective
Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective

The ubiquitous nature of the Internet is dramatically revolutionizing the manner in which organizations and individuals share information. Developed out of necessity during the cold war, the Internet was created as a means to help governmental institutions and collegiate institutions send documents and research materials electronically...

Knowledge Mapping and Management
Knowledge Mapping and Management

Knowledge Management is fast becoming a hot topic of discussion and research. The capture, use, production and storage of knowledge is an issue of paramount importance for businesses, universities, public and private organizations. Because this is such an important topic, it is essential for researchers, academicians and managers to...

CompTIA Security+ SYO-201 Cert Guide
CompTIA Security+ SYO-201 Cert Guide

Welcome to the CompTIA Security+ SY0-201 Cert Guide. The CompTIA Security+ Certification is widely accepted as the first security certification you should attempt to attain in your information technology (IT) career. The CompTIA Security+ Certification is designed to be a vendor-neutral exam that measures your knowledge of...

Computer Organization and Design, Third Edition: The Hardware/Software Interface, Third Edition
Computer Organization and Design, Third Edition: The Hardware/Software Interface, Third Edition

We believe that learning in computer science and engineering should reflect the current state of the field, as well as introduce the principles that are shaping computing. We also feel that readers in every specialty of computing need to appreciate the organizational paradigms that determine the capabilities, performance, and,...

How to Cheat in 3ds Max 2011: Get Spectacular Results Fast
How to Cheat in 3ds Max 2011: Get Spectacular Results Fast

THE TECHNIQUES DESCRIBED in this book assume a basic grasp of 3ds Max. But with so many options to choose from, it’s easy to get lost in all the tools, buttons, and menus.

Not all features are created equal. This chapter goes over the fundamentals of 3ds Max with an eye toward the most important tools and how you...

CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience
CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience

CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It...

Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL
Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL

Since the first edition of Semantic Web for the Working Ontologist came out in June 2008, we have been encouraged by the reception the book has received. Practitioners from a wide variety of industries— health care, energy, environmental science, life sciences, national intelligence, and publishing, to name a few—have told...

Leading with Cultural Intelligence: The New Secret to Success
Leading with Cultural Intelligence: The New Secret to Success
We are pleased to write the foreword to David Livermore’s latest book on cultural intelligence (CQ). We have known Dave professionally for many years and have followed his work with great interest. Dave has always had a passion for intercultural training and education and has spent several years training leaders to serve on short-term...
Result Page: 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy