Grounding is the fundamental measures to ensure the safe operation of power systems, including power apparatus and control/monitoring systems, and guarantee the personal safety. Grounding technology is an interdiscipline involving electrical engineering, high voltage technology, electric safety, electromagnetics, numerical analysis, and...
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment
Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...
Digital Asset Management: Content Architectures, Project Management, and Creating Order out of Media Chaos is for those who are planning a digital asset management system or interested in becoming digital asset managers. This book explains both the purpose of digital asset management systems and why an organization...
Yeasts are a versatile group of eukaryotic microorganisms, exhibiting heterogeneous nutritional profiles and an extraordinary ability to survive in a wide range of natural and man-associated ecosystems, including cold habitats. Cold-adapted yeasts inhabit numerous low-temperature environments where they are subjected to seasonal or permanent...
Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are not...
"Filled with treasure and big ideas, this book will help you become exceptional." - SETH GODIN
In a tight market, your most powerful growth engine and your best protection from competitive inroads is this: put every thing you can into cultivating true customer loyalty. Loyal customers are less sensitive to...
Long gone are the days where the security of your critical data could be
protected by security guards, cipher locks, and an ID badge worn by all
employees. As the computing paradigm is continually changing with shared
resources and mobility, firewalls and antivirus software are also not enough
to protect critical assets. This...
PHP is a server-side scripting language that enables you to develop dynamic sites that engage users in ways that are simply not possible using only HTML and CSS. PHP for Absolute Beginners takes a practical approach to teaching you how to build dynamic content for your website using PHP. You’ll quickly get started with...
Stop pushing your message out and start pulling your customers in
Traditional "outbound" marketing methods like cold-calling, email blasts, advertising, and direct mail are increasingly less effective. People are getting better at blocking these interruptions out using Caller ID, spam protection, TiVo,...
This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference...
Biotechnological advancements during the last half-century have forced humanity to come to grips with the possibility of a post-human future. The ever-evolving opinions about how society should anticipate this biotechnological frontier demand a language that will describe our new future and discuss its ethics. After the Genome brings...