Home | Amazing | Today | Tags | Publishers | Years | Search 
The Independence of Credit Rating Agencies: How Business Models and Regulators Interact
The Independence of Credit Rating Agencies: How Business Models and Regulators Interact

The Independence of Credit Rating Agencies focuses on the institutional and regulatory dynamics of these agencies, asking whether their business models give them enough independence to make viable judgments without risking their own profitability.

Few have closely examined the analytical methods of credit rating agencies,...

Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Overview

  • Learn sample forms and process flows for quick and easy use.
  • An easy-to-follow reference for implementing information security in the enterprise.
  • Learn...
Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond
Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond

Mobile computing skills are becoming standard in the IT industry

Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond is the ultimate reference for mobile computing. Certified Wireless Network Expert Robert J. Bartz guides IT and networking professionals through...

Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)
Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)

Since the pioneering work of Joseph Schumpeter (1942), it has been assumed that innovations typically play a key role in firms’ competitiveness.  This assumption has been applied to firms in both developed and developing countries. However, the innovative capacities and business environments of firms in developing countries are...

The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards
The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards

Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features...

Learning AirWatch
Learning AirWatch

Learn to implement, manage, and deploy the latest Enterprise Mobility Management (EMM) platform offered by AirWatch

About This Book

  • Understand Enterprise Mobility Management (EMM) and all the features involved in creating a robust deployment
  • Integrate and secure EMM solutions with your...
Introduction to Social Media Investigation: A Hands-on Approach
Introduction to Social Media Investigation: A Hands-on Approach

If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share...

Marginality: Addressing the Nexus of Poverty, Exclusion and Ecology
Marginality: Addressing the Nexus of Poverty, Exclusion and Ecology

This book takes a new approach on understanding causes of extreme poverty and promising actions to address it. Its focus is on marginality being a root cause of poverty and deprivation. “Marginality” is the position of people on the edge, preventing their access to resources, freedom of choices, and the development of...

Search for the Ultimate Energy Source: A History of the U.S. Fusion Energy Program (Green Energy and Technology)
Search for the Ultimate Energy Source: A History of the U.S. Fusion Energy Program (Green Energy and Technology)

Why has the clean, limitless energy promised by fusion always seemed just out of reach?

Search for the Ultimate Energy Source: A History of the U.S. Fusion Energy Program, explains the fundamentals and concepts behind fusion power, and traces the development of fusion historically by decade―covering its history as...

Green Design, Materials and Manufacturing Processes
Green Design, Materials and Manufacturing Processes

The rise of manufacturing intelligence is fuelling innovation in processes and products concerning a low environmental impact over the product’s lifecycle. Sustainable intelligent manufacturing is regarded as a manufacturing paradigm for the 21st century, in the move towards the next generation of manufacturing and processing...

Amazon S3 Cookbook
Amazon S3 Cookbook

Over 30 hands-on recipes that will get you up and running with Amazon Simple Storage Service (S3) efficiently

About This Book

  • Learn how to store, manage, and access your data with AWS SDKs
  • Study the Amazon S3 pricing model and learn how to calculate costs by simulating practical...
VMware vRealize Orchestrator Cookbook
VMware vRealize Orchestrator Cookbook

Master the configuration, programming, and interaction of plugins with Orchestrator to efficiently automate your VMware infrastructure

About This Book

  • Program with Orchestrator to automate and synchronize your infrastructure
  • Integrate the base plug-ins into your workflows
  • ...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy