 |
|
 Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Economics for the Rest of Us: Debunking the Science that Makes Life Dismal
Why do contemporary economists consider food subsidies in starving countries, rent control in rich cities, and health insurance everywhere "inefficient"? Why do they feel that corporate executives deserve no less than their multimillion-dollar "compensation" packages and workers no more than their meager wages? Here is a... |  |  ITIL Service Design 2011 Edition
The ITIL 2011 Editions have been updated for clarity, consistency, correctness and completeness. In order to meet current and future business requirements, ITIL Service Design provides guidance on the production and maintenance of IT policies, architectures and documents for the design of appropriate and innovative IT infrastructure services... |
|
 Biofuels for Transport: An International Perspective
The IEA last published a book on biofuels in 1994 (Biofuels). Many
developments have occurred in the past decade, though policy objectives
remain similar: improving energy security and curbing greenhouse gas
emissions are, perhaps more than ever, important priorities for IEA countries.
And, more than ever, transportation energy... |  |  Knowledge Management And Risk Strategies
This book deals with knowledge management with an emphasis on knowledge risk, i.e., a general trend of knowledge value getting shorter and becoming temporary. The shortening of knowledge value lifespan will have a profound impact on companies' employment policies, and employees' strategies for gaining knowledge. How to manage... |  |  Microsoft Dynamics AX 2012 Security How-To
Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users' privileges and access rights. Hackers raise their awareness to hack and attack ERP systems as the information becomes the vital weapon these days. So securing your ERP is not only about internal... |
|
|
 Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the
fundamentals of advanced network security. The previous edition of this book placed significant
emphasis on intrusion detection, but this edition aims to provide a more balanced approach to
the topic of network defense and countermeasures. As... |  |  Microsoft SharePoint 2013: Planning for Adoption and Governance
Deliver a successful SharePoint solution to your organization
Take control of the complex requirements for delivering a SharePoint 2013 solution to your organization. Led by a SharePoint MVP specializing in SharePoint service delivery, you’ll learn proven methods to help you prepare for a smooth adoption and... |  |  Clinical Trials Handbook: Design and Conduct
A systematic approach to all aspects of designing and conducting clinical trials
The success or failure of clinical trials hinges on hundreds of details that need to be developed, often under less than ideal conditions. Written by one of the world's leading trialists, Clinical Trials Handbook: Design and Conduct... |
|
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 |