Home | Amazing | Today | Tags | Publishers | Years | Search 
Visualizing Data Patterns with Micromaps (Chapman & Hall/CRC Interdisciplinary Statistics)
Visualizing Data Patterns with Micromaps (Chapman & Hall/CRC Interdisciplinary Statistics)

After over fifteen years of research and trial and error, micromap designs have evolved to the point where they are slowly finding their way into mainstream statistical visualizations. Now seems to be a good time to pull all of the work together into a book in order to introduce micromaps to a wide range of people interested in...

Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)
Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)

With all the fantastic Cisco documentation available online, why does the world of UCCE need this book? UCCE is such a big topic that it would be easy to think that it is possible to try and cover absolutely everything. Unfortunately, this would turn this book into nothing more than a product reference manual that could potentially be...

Auditing Social Media: A Governance and Risk Guide
Auditing Social Media: A Governance and Risk Guide

As I look back on my career at Microsoft, I feel fortunate to have had a front-row seat to witness an incredible shift in how people and organizations communicate and interact. I started at Microsoft in October 1994—about a year after America Online released AOL 1.0 for Windows. As early adopters of social media,...

Numerical Methods in Finance and Economics: A MATLAB-Based Introduction (Statistics in Practice)
Numerical Methods in Finance and Economics: A MATLAB-Based Introduction (Statistics in Practice)

A state-of-the-art introduction to the powerful mathematical and statistical tools used in the field of finance The use of mathematical models and numerical techniques is a practice employed by a growing number of applied mathematicians working on applications in finance. Reflecting this development, Numerical Methods in Finance and...

Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web

Privacy is a basic human need, and losing privacy is perceived as an extremely threatening experience. Privacy embraces solitude, personal space, or intimacy with family and friends and as such, it is a ubiquitous and trans-cultural phenomenon. Privacy leverages well-being; without privacy we are at risk of becoming physically or...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

Data Integration Blueprint and Modeling: Techniques for a Scalable and Sustainable Architecture
Data Integration Blueprint and Modeling: Techniques for a Scalable and Sustainable Architecture

Making Data Integration Work: How to Systematically Reduce Cost, Improve Quality, and Enhance Effectiveness

 

Today’s enterprises are investing massive resources in data integration. Many possess thousands of point-to-point data...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

The Social Media Business Equation
The Social Media Business Equation

My journey down the social media road began years ago, and many people have praised me for my foresight and brilliance. They are very kind, but the truth is, what really took me down this road was desperation. A few years ago—perhaps you remember—the economy took a heck of a dip. On its way down, it punched me in the...

Windows Phone 7 Silverlight Cookbook
Windows Phone 7 Silverlight Cookbook

I am delighted that Jonathan and Robb undertook the task of writing this book. Both Jonathan and Robb have been involved in the .NET community for a number of years and developed a passion for the Windows Phone. With this book, they have decided to share their knowledge and experience with their readers to help developers dive into doing more...

Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy