Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools
Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools

A Toolkit for IT Professionals

Whether you work for a publicly traded or pre-IPO company or as an IT consultant, you are familiar with the daunting task of complying with the Sarbanes-Oxley Act. You have no doubt seen the hour and dollar estimates for compliance go up...

Samba-3 by Example: Practical Exercises to Successful Deployment (2nd Edition) (Bruce Perens Open Source)
Samba-3 by Example: Practical Exercises to Successful Deployment (2nd Edition) (Bruce Perens Open Source)

The Practical, Tested, Step-by-Step Samba-3 Guidebook Has Now Been Fully Updated!

The definitive Samba-3 guidebook has been completely updated to reflect the latest Samba releases and migration techniques. This book’s complete configuration files, step-by-step implementation instructions, network diagrams, and...

Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010

The present volume contains the proceedings of the seventh international workshop on Formal Aspects of Security and Trust (FAST 2010), held in Pisa, Italy, 16–17 September 2010, as part of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010).

FAST aims to foster cooperation among...

Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management

The Definitive Guide to Protecting Enterprise Data

Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...

Human Genome Epidemiology, 2nd Edition
Human Genome Epidemiology, 2nd Edition

The first edition of Human Genome Epidemiology, published in 2004, discussed how the epidemiologic approach provides an important scientific foundation for studying the continuum from gene discovery to the development, applications and evaluation of human genome information in improving health and preventing disease. Since that time,...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Handbook of Exchange Rates (Wiley Handbooks in Financial Engineering and Econometrics)
Handbook of Exchange Rates (Wiley Handbooks in Financial Engineering and Econometrics)

Praise for Handbook of Exchange Rates

“This book is remarkable. I expect it to become the anchor reference for people working in the foreign exchange field.”

—Richard K. Lyons, Dean and Professor of Finance, Haas School of Business, University of California...

Apache CloudStack Cloud Computing
Apache CloudStack Cloud Computing

Setting up a cloud computing service, whether for yourself or a customer, is greatly simplified by this step-by-step guide to Cloudstack – the world’s leading open source platform. It’s all here, from installing to extending.

Overview

  • Install, deploy, and manage a cloud service using...
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Web 2.0: The Business Model
Web 2.0: The Business Model
Web 2.0 is one of the most prominent business models for information systems available today. It brings together technology and social networks, and the interactivity that creates business value.

Web 2.0: The Business Model, an edited volume, is the first reference that integrates the business implications of Web 2.0/3.0, along...

Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise
Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise

A must-have for all companies undertakingservice-oriented architecture (SOA) governance

As SOA interest and adoption have accelerated rapidly, the challenges of governance have risen to the forefront across the entire industry. Without an SOA governance model, SOA adoption is stilted and hampered by a lack of...

Flex 3 with Java
Flex 3 with Java

Flex 3 is a great technology for developing Rich Internet Applications for the Web as well as for the desktop. If you are a developer looking to design great-looking and sophisticated user interfaces that resemble desktop-based applications, and want to utilize an existing server technology such as Java to develop RIAs, this book is for you.

...
unlimited object storage image
Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy