Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beyond Governance: Creating Corporate Value through Performance, Conformance and Responsibility
Beyond Governance: Creating Corporate Value through Performance, Conformance and Responsibility
T oday’s finance professionals face a very different world to
their predecessors. The steady, planned and predictable
world of the accountant has been changed beyond
measure, by a number of pressures including:

. corporate scandals and the consequent intense focus on
corporate governance and risk management;...
A Practical Guide to Managing Information Security (Artech House Technology Management Library)
A Practical Guide to Managing Information Security (Artech House Technology Management Library)
This groundbreaking book helps you master the management of information security, concentrating on the proactive recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk commercial environments, the work focuses on the need...
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
Taylor's Musculoskeletal Problems and Injuries: A Handbook
Taylor's Musculoskeletal Problems and Injuries: A Handbook
After more than a quarter century as a primary care educator, I am convinced that our graduates enter practice inadequately trained in the diagnosis and management of musculoskeletal problems and injuries. One reason for this perceived deficiency is the relatively short duration of primary care training—typically three...
Weather Matters for Energy
Weather Matters for Energy

It is the purpose of this book to provide the meteorological knowledge and tools to improve the risk management of energy industry decisions, ranging from the long term finance and engineering planning assessments to the short term operational measures for scheduling and maintenance. Most of the chapters in this book are based on...

Vision in Alzheimer's Disease (Interdisciplinary Topics in Gerontology and Geriatrics, Vol. 34)
Vision in Alzheimer's Disease (Interdisciplinary Topics in Gerontology and Geriatrics, Vol. 34)

Visual dysfunction is prevalent in Alzheimer’s disease and in related disorders such as posterior cortical atrophy and Down syndrome. The neuropathology of these disorders affects brain areas that process low-level vision as well as higher-order cognition and attention. This volume spans the range of topics on vision, from structure...

Quantitative Methods in Project Management
Quantitative Methods in Project Management
This book combines theoretical and practical applications and takes project managers through the most important quantitative methods, integrates them, and illustrates interrelationships.

This is a practitioner’s book, combining theoretical and practical applications for project professionals. It is a loosely coupled work flow that...

Six Sigma for Marketing Processes: An Overview for Marketing Executives, Leaders, and Managers
Six Sigma for Marketing Processes: An Overview for Marketing Executives, Leaders, and Managers

Nearly half of the top one hundred Fortune 500 companies use Six Sigma methodology in some part of their business. These companies have been among the top one hundred for five or more years and consistently report higher revenue and significantly higher profits than competitors. This...

Configuring Sonicwall Firewalls
Configuring Sonicwall Firewalls
Every enterprise requires at least one firewall to provide the backbone for its network
security architecture. Firewalls are the core component of your network’s security.
The risks today have greatly increased, so the call for a stronger breed of firewall
has been made. In the past, simple packet-filtering firewalls allowing
...
Mobile Intelligence (Wiley Series on Parallel and Distributed Computing)
Mobile Intelligence (Wiley Series on Parallel and Distributed Computing)

Nowadays, it is very common to see people everywhere and at anytime use mobile telecommunications devices, such as cellular/mobile phones, Personal Digital Assistants (PDAs), or laptop equipped with wireless connectivity to communicate with the network and access information. This phenomenon, which is generally known as mobile computing is...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Sudden Infant Death Syndrome: From Pathophysiological Prospects
Sudden Infant Death Syndrome: From Pathophysiological Prospects

Sudden infant death syndrome (SIDS) is characterised by the sudden death of an infant that is not predicted by prior medical history and it is still responsible for a large percentage of infant mortalities. The exact causes have long remained unknown, though some risk factors such as including exposure to tobacco smoke, no breast...

unlimited object storage image
Result Page: 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy