Home | Amazing | Today | Tags | Publishers | Years | Search 
Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results
Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results

Harness the Power of Your Most Valuable Resource—Your Workforce!

Process improvement approaches like Six Sigma and Lean Enterprise have worked wonders for countless organizations, but in the drive for true excellence, these approaches are only one important part of the formula.

Building Engaged...

Advances in Audio and Speech Signal Processing: Technologies and Applications
Advances in Audio and Speech Signal Processing: Technologies and Applications

Audio and speech processing have achieved important status in development in the last three decades, improving the standard of living of many people. Regarding these applications, several signal processing algorithms have been developed to assist the speech impaired and improve the learning ability of children. Advances in Audio and Speech...

Above the Clouds: Managing Risk in the World of Cloud Computing
Above the Clouds: Managing Risk in the World of Cloud Computing

Interested in ways to make your business more efficient? Then Cloud Computing may be just what you have been looking for. Cloud Computing can enable you to drive down the costs of your IT function and gives you the ability to focus on your core business, whilst saving energy. The concept of shifting computing to a shared service provider is...

Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

x86 Instruction Set Architecture
x86 Instruction Set Architecture

The Instruction Set Architecture, or ISA, is defined as that part of the processor architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO. With the exception of some small deviations and differences in...

Smart Card Handbook
Smart Card Handbook

The most comprehensive book on state-of-the-art smart card technology available

Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health...

Rethinking Enterprise Storage: A Hybrid Cloud Model
Rethinking Enterprise Storage: A Hybrid Cloud Model
Just as the Internet has fundamentally changed many industries, cloud computing is fundamentally changing the information technology industry, including infrastructures such as enterprise data storage. This book is about one of the new infrastructure game changers—a storage architecture called hybrid cloud storage that was...
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...

Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations...

Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

Introduction to 64 Bit Intel Assembly Language Programming for Linux
Introduction to 64 Bit Intel Assembly Language Programming for Linux
The Intel CPU architecture has evolved over 3 decades from a 1 6 bit CPU with no memory protection, through a period with 32 bit processors with sophisticated architectures into the current series of processors which support all the old modes of operation in addition to a greatly expanded 64 bit mode of operation. Assembly...
Intellectual Property: The Law of Trademarks, Copyrights, Patents, and Trade Secrets for the Paralegal
Intellectual Property: The Law of Trademarks, Copyrights, Patents, and Trade Secrets for the Paralegal

The field of intellectual property (typically referred to as IP) is one that continues its rapid growth. Just a few years ago, individuals who identifi ed themselves as practitioners in the fi eld of intellectual property were met with blank stares. Now IP professionals are in constant demand, and it is a rare issue of any legal newspaper...

Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy