Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Economics for the Rest of Us: Debunking the Science that Makes Life Dismal
Economics for the Rest of Us: Debunking the Science that Makes Life Dismal

Why do contemporary economists consider food subsidies in starving countries, rent control in rich cities, and health insurance everywhere "inefficient"? Why do they feel that corporate executives deserve no less than their multimillion-dollar "compensation" packages and workers no more than their meager wages? Here is a...

ITIL Service Design 2011 Edition
ITIL Service Design 2011 Edition

The ITIL 2011 Editions have been updated for clarity, consistency, correctness and completeness. In order to meet current and future business requirements, ITIL Service Design provides guidance on the production and maintenance of IT policies, architectures and documents for the design of appropriate and innovative IT infrastructure services...

Biofuels for Transport: An International Perspective
Biofuels for Transport: An International Perspective
The IEA last published a book on biofuels in 1994 (Biofuels). Many developments have occurred in the past decade, though policy objectives remain similar: improving energy security and curbing greenhouse gas emissions are, perhaps more than ever, important priorities for IEA countries. And, more than ever, transportation energy...
Knowledge Management And Risk Strategies
Knowledge Management And Risk Strategies

This book deals with knowledge management with an emphasis on knowledge risk, i.e., a general trend of knowledge value getting shorter and becoming temporary. The shortening of knowledge value lifespan will have a profound impact on companies' employment policies, and employees' strategies for gaining knowledge. How to manage...

Microsoft Dynamics AX 2012 Security How-To
Microsoft Dynamics AX 2012 Security How-To

Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users' privileges and access rights. Hackers raise their awareness to hack and attack ERP systems as the information becomes the vital weapon these days. So securing your ERP is not only about internal...

Hands-on Guide to the Red Hat Exams: RHCSA and RHCE Cert Guide and Lab Manual
Hands-on Guide to the Red Hat Exams: RHCSA and RHCE Cert Guide and Lab Manual

Master every topic on Red Hat’s new RHCSA™ and RHCE® exams.

  • Assess your knowledge and focus your learning.
  • Get the practical workplace knowledge you need!

 

Start-to-finish RHCSA™ and...

Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...

The Innovative CIO: How IT Leaders Can Drive Business Transformation
The Innovative CIO: How IT Leaders Can Drive Business Transformation

“Does your organization fumble when it comes to innovation? ‘The Innovative CIO’ presents a pragmatic guide to overcoming the 10 ‘innovation killers’ within your company.”  --Dennis McCafferty “CIO Insight”, 1/23/2013...

Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
Microsoft SharePoint 2013: Planning for Adoption and Governance
Microsoft SharePoint 2013: Planning for Adoption and Governance

Deliver a successful SharePoint solution to your organization

Take control of the complex requirements for delivering a SharePoint 2013 solution to your organization. Led by a SharePoint MVP specializing in SharePoint service delivery, you’ll learn proven methods to help you prepare for a smooth adoption and...

Clinical Trials Handbook: Design and Conduct
Clinical Trials Handbook: Design and Conduct

A systematic approach to all aspects of designing and conducting clinical trials

The success or failure of clinical trials hinges on hundreds of details that need to be developed, often under less than ideal conditions. Written by one of the world's leading trialists, Clinical Trials Handbook: Design and Conduct...

Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy