Home | Amazing | Today | Tags | Publishers | Years | Search 
Making Enterprise Information Management (EIM) Work for Business: A Guide to Understanding Information as an Asset
Making Enterprise Information Management (EIM) Work for Business: A Guide to Understanding Information as an Asset

Organizations of all types struggle with information. Millions of dollars are spent on ERP applications to integrate data and yet this data still isn't accessible or relevant. Emails contain hidden liabilities. Safety manuals endanger workers. Worse, there is data and information being created and handled in every nook and cranny of large...

Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing...

American Medical Association Guide to Preventing and Treating Heart Disease
American Medical Association Guide to Preventing and Treating Heart Disease

More Than 3 Million American Medical Association Books Sold.

American's most trusted medical authority shows you how to prevent and treat heart disease.

When you or someone you love is diagnosed with cardiovascular disease, it's important to know the facts, which can help save a life. In the American
...

Practical Software Project Estimation: A Toolkit for Estimating Software Development Effort & Duration
Practical Software Project Estimation: A Toolkit for Estimating Software Development Effort & Duration

Product verifiable, defensible, and achievable software estimates

Based on data collected by the International Software Benchmarking Standards Group (ISBSG), Practical Software Project Estimation explains how to accurately forecast the size, cost, and schedule of software projects. Get expert advice on generating accurate...

Glitch: The Hidden Impact of Faulty Software
Glitch: The Hidden Impact of Faulty Software

Don’t Let Software Failures Destroy Your Business

  • The growing impact of software failures on brands, customers, and business performance
  • How to govern software more effectively, prepare for glitches, and...
Musical Performance: A Comprehensive Approach: Theory, Analytical Tools, and Case Studies
Musical Performance: A Comprehensive Approach: Theory, Analytical Tools, and Case Studies

This book is a first sketch of what the overall field of performance could look like as a modern scientific field but not its stylistically differentiated practice, pedagogy, and history. Musical performance is the most complex field of music. It comprises the study of a composition’s expression in terms of...

Business in the Cloud: What Every Business Needs to Know About Cloud Computing
Business in the Cloud: What Every Business Needs to Know About Cloud Computing

A close look at cloud computing's transformational role in business

Covering cloud computing from what the business leader needs to know, this book describes how IT can nimbly ramp up revenue initiatives, positively impact business operations and costs, and how this allows business leaders to shed worry about technology so they...

BTEC National Engineering
BTEC National Engineering

Health and safety is of prime importance to all people working in manufacturing or engineering workplaces. Engineering can be, potentially, one of the most dangerous occupations workers can undertake because of the nature of the machinery, equipment, tools and techniques used. All workers should be protected from danger and risks to their...

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Get Started in Computing
Get Started in Computing

Get Started in Computing is for anyone who wants to learn how to make good use of their PC. It doesn ’ t assume that you are a complete novice – there are very few of those left! You have probably used a PC a little – and can steer the mouse and use the keyboard (at least a bit).

You may have done a little...

CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience
CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience

CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It...

Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy