In the past ten years or so, software architecture has emerged as a central notion in the development of complex software systems. Software architecture is now accepted in the software engineering research and development community as a manageable and meaningful abstraction of the system under development and is applied throughout the...
Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
“a comprehensive overview of both DDS architectures and fractional-N frequency synthesizers.” Microwave Journal said this book “is aimed specifically at practical designers and utilizes many intuitive explanations and design examples.” Microwaves & RF magazine
Oracle's JD Edwards EnterpriseOne Supply Chain Management (SCM) application suite aids
your business in enhancing your interactions with Enterprise suppliers, and this practical
cookbook provides essential implementation sequences to make the most of the suite. The
functionality across the application described in this...
Managing Your Outsourced IT Services Provider teaches executives and managers of organizations how to unleash the full potential of their outsourced IT services workforce and IT-enabled business processes safely and profitably. Drawing on two decades of experience managing client relationships for global IT services companies,...
A Step-by-Step Approach for Integrating Market, Credit, and Operational Risk Management--While Complying with New Basel Accord Guidelines
For financial institutions around the world, the work involved in managing market, credit, and operational risk exposures--as well as the capital required to support such...
Throughout this book we’ll be developing a set of solutions (in the form of custom controls most of the time) designed to tackle the more common needs of Web Application development. These range from simple and self-contained controls, like the Spinner control developed in Chapter 2, to more advanced and complex solutions, such as the...
A rigorous study guide for the PTCE?with strategies, review questions and 4 full-length practice tests
Passing the Pharmacy Technician Certification Exam is essential for all future pharmacy technicians. Give yourself an edge on this test by boosting your exam-day confidence with the best possible study guide. This...
A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of...