Home | Amazing | Today | Tags | Publishers | Years | Search 
Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications
Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and wireless network security.? This...

Computer Assisted Exercises and Training: A Reference Guide
Computer Assisted Exercises and Training: A Reference Guide

A comprehensive guide to computer assisted exercises

Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive computer assisted exercises (CAX) and war games. It is geared also toward large...

Above the Clouds: Managing Risk in the World of Cloud Computing
Above the Clouds: Managing Risk in the World of Cloud Computing

Interested in ways to make your business more efficient? Then Cloud Computing may be just what you have been looking for. Cloud Computing can enable you to drive down the costs of your IT function and gives you the ability to focus on your core business, whilst saving energy. The concept of shifting computing to a shared service provider is...

Virtual Technologies for Business and Industrial Applications: Innovative and Synergistic Approaches
Virtual Technologies for Business and Industrial Applications: Innovative and Synergistic Approaches

Business growth depends on the ability to innovate. Knowledge management concepts, business process reengineering, human centered assets and information and communication technologies are the foundation for innovation though virtual reality makes innovation a reality.

Virtual Technologies for Business and Industrial...

Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)

This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems...

Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

Living With the Internet and Online Dangers (Teen's Guides)
Living With the Internet and Online Dangers (Teen's Guides)

Living with the Internet and Online Dangers highlights the risks and problems that come with modern Web technology, as well as what teens can do to protect themselves. Chapters explore online job hunting, email scams and Internet fraud, finding that special someone online, and wireless security. Written in straightforward language, this new...

Managing Risk In Information Systems (Information Systems Security & Assurance Series)
Managing Risk In Information Systems (Information Systems Security & Assurance Series)

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Managing Risk in Information Systems provides a unique, in-depth look at how to manage and reduce IT associated risks. Written by an industry expert, this book provides a comprehensive explanation of the SSCP® Risk, Response, and Recovery...

Competitive Intelligence: Gathering, Analysing And Putting It to Work
Competitive Intelligence: Gathering, Analysing And Putting It to Work

Every business manager needs intelligence to find suppliers, mobilize capital, win customers and fend off rivals. Obtaining this is often an unplanned, instinctive process. The manager who has a conscious, systematic approach to acquiring intelligence will be better placed to recognize and seize opportunities whilst safeguarding the...

Financial Risk Modelling and Portfolio Optimization with R (Statistics in Practice)
Financial Risk Modelling and Portfolio Optimization with R (Statistics in Practice)

Introduces the latest techniques advocated for measuring financial market risk and portfolio optimization, and provides a plethora of R code examples that enable the reader to replicate the results featured throughout the book.

Financial Risk Modelling and Portfolio Optimization with R:

Bond Investing For Dummies
Bond Investing For Dummies

Bonds and bond funds are among the safest and most reliable investments you can make to ensure an ample and dependable retirement income — if you do it right! Bond Investing For Dummies helps you do just that, with clear explanations of everything you need to know to build a diversified bond portfolio that will be there when you...

Invest Like an Institution: Professional Strategies for Funding a Successful Retirement
Invest Like an Institution: Professional Strategies for Funding a Successful Retirement

All too often, when investors go in search of investment advice, they are met with television personalities and so-called investment “gurus” who do little more than push the latest and greatest scheme to retire rich. Your retirement funds—in the form of IRAs, 401(k)s, SEP or Simple IRAs, and other plans you can direct to...

Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy