Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
Managing Oracle Fusion Applications (Oracle Press)
Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole new level. Whether you’re in the IT department, a systems integrator, a business leader, or an end user, Fusion Applications has more of what you need, less of what you don’t, and some of what you didn’t even think possible.
...
iOS 5 Programming Pushing the Limits: Developing Extraordinary Mobile Apps for Apple iPhone, iPad, and iPod Touch
iOS 5 Programming Pushing the Limits: Developing Extraordinary Mobile Apps for Apple iPhone, iPad, and iPod Touch
Apple has a history of alternating its releases between user-focus and developer-focus. The good news about iOS 5 is that it's all about the developers. The addition of Automatic Reference Counting (ARC) alone is worth the upgrade for developers. In one move, Apple has eliminated the number one cause of crashes in iOS applications,...
Advances in Information Processing and Protection
Advances in Information Processing and Protection
This book contains a selection of the best papers given at the Advanced Computer Systems Conference in October 2006 in Poland. The book is partitioned into four topical areas:

The Artificial Intelligence section includes papers on Humatronics, Fuzzy Logic, Robotics, Cell, Genetic and Probabilistic Algorithms, Incomplete Data and Similarity...

Chemical Analysis of Contaminated Land (Sheffield Analytical Chemistry)
Chemical Analysis of Contaminated Land (Sheffield Analytical Chemistry)
This book sets out to provide a description of the chemical analysis of potentially contaminated land for all those involved in risk assessment. It is not intended as a recipe book of analytical methods. Indeed, with the wide range of techniques and options available, it would be impracticable and unnecessary to document all potential methods, and...
Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results
Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results

Harness the Power of Your Most Valuable Resource—Your Workforce!

Process improvement approaches like Six Sigma and Lean Enterprise have worked wonders for countless organizations, but in the drive for true excellence, these approaches are only one important part of the formula.

Building Engaged...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Advanced Technologies in Robotics and Intelligent Systems: Proceedings of ITR 2019 (Mechanisms and Machine Science)
Advanced Technologies in Robotics and Intelligent Systems: Proceedings of ITR 2019 (Mechanisms and Machine Science)

This volume gathers the latest advances, innovations, and applications in the field of intelligent systems such as robots, cyber-physical and embedded systems, as presented by leading international researchers and engineers at the International Conference on Intelligent Technologies in Robotics (ITR), held in Moscow, Russia on...

IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Cryptography in C and C++
Cryptography in C and C++
  • Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain
  • Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++
  • Not toy code(tm), but a practical treatment of modern cryptographic...
Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy