Home | Amazing | Today | Tags | Publishers | Years | Search 
Manager's Guide to Social Media (Briefcase Books Series)
Manager's Guide to Social Media (Briefcase Books Series)

JUMP START PRODUCTIVITY, PROFITABLILITY, AND BUSINESS GROWTH WITH SOCIAL MEDIA!

Facebook, Twitter, and YouTube have changed everything. Some managers fear their employees will waste entire days using online social media. Smart managers, though, understand that social media is a powerful tool for engaging customers and growing...

Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance
Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance

This book is about expanding Internet business risk management strategies into resilience such as software diversity; into financial risk transfer instruments such as insurance policies, catastrophe bonds, performance bonds, and self-insurance as in Basel II; and into reputation systems.

Traditional Internet performance and...

Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)

Event-based distributed systems are playing an ever increasing role in areas such as enterprise management, information dissemination, finance, environmental monitoring and geo-spatial systems. Event-based processing originated with the introduction of Event-Condition-Action (ECA) rules to database systems in the 1980s. Since then,...

SOA Governance: Governing Shared Services On-Premise and in the Cloud
SOA Governance: Governing Shared Services On-Premise and in the Cloud

The Definitive Guide to Governing Shared Services and SOA Projects

 SOA Governance: Governing Shared Services On-Premise and in the Cloud is the result of a multi-year project to collect proven industry practices for establishing IT governance controls specific to the adoption of SOA...

Mobile and Wireless Network Security and Privacy
Mobile and Wireless Network Security and Privacy

Currently the mobile wireless technology is experiencing rapid growth. However the major challenge for deployment of this technology with its special characteristics is securing the existing and future vulnerabilities. Major security and privacy issues for standard wireless networks include the authentication of wireless clients and...

Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Third Edition
Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Third Edition

Essential Skills for a Successful IT Career

Written by CompTIA certification and training expert Mike Meyers, this instructive, full-color guide will help you pass the CompTIA A+ exams and become an expert hardware technician. Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Third Edition is...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
TcL Scripting for Cisco IOS (Networking Technology)
TcL Scripting for Cisco IOS (Networking Technology)

A guide to building and modifying Tcl scripts to automate network administration tasks

 

Streamline Cisco network administration and save time with Tcl scripting

Cisco networking professionals are under relentless pressure to...

packetC Programming
packetC Programming

This book covers a vast array of information related to packetC. It is a complete language reference and contains background information on many unique parts of packetC. As packetC shares much of its grammar with C, the book focuses on being an instructional language reference and not a general C programming introduction, since extensive...

Digital Video Broadcasting: Technology, Standards, and Regulations
Digital Video Broadcasting: Technology, Standards, and Regulations
Many books and articles on the transition of television from analog to digital transmission have been published in recent years. This transition is still in its infancy, but it will inevitably take place in the years to come. Due to digitization, the existing barriers between audio, video, and data generation and transmission...
Managing Oracle Fusion Applications (Oracle Press)
Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole new level. Whether you’re in the IT department, a systems integrator, a business leader, or an end user, Fusion Applications has more of what you need, less of what you don’t, and some of what you didn’t even think possible.
...
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy