Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
Technology and Safety of Marine Systems (Ocean Engineering Series)
Technology and Safety of Marine Systems (Ocean Engineering Series)
Traditionally society has regulated hazardous industries by detailed references to engineering codes, standards and hardware requirements. These days a risk-based approach is adopted. Risk analysis involves identifying hazards, categorizing the risks, and providing the necessary decision support to determine the necessary arrangements and...
Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web...
The Radical Leap: A Personal Lesson in Extreme Leadership
The Radical Leap: A Personal Lesson in Extreme Leadership
The business world is ready for an entirely new approach to leadership, and Steve Farber has written the perfect book to energize business leaders and help them make the leap into extreme leadership. In fact, taking a giant "L.E.A.P" forward is exactly what Farber prescribes. What exactly is an extreme leader? One who cultivates love,...
Cloud Application Architectures: Building Applications and Infrastructure in the Cloud
Cloud Application Architectures: Building Applications and Infrastructure in the Cloud

If you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, highly redundant infrastructure services.


While analysts hotly debate the advantages and risks of cloud
...
Data Protection: Governance, Risk Management, and Compliance
Data Protection: Governance, Risk Management, and Compliance

Failure to appreciate the full dimensions of data protection can lead to poor data protection management, costly resource allocation issues, and exposure to unnecessary risks. Data Protection: Governance, Risk Management, and Compliance explains how to gain a handle on the vital aspects of data protection.

The author...

Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

Trading For Dummies (Business & Personal Finance)
Trading For Dummies (Business & Personal Finance)

Now updated — your guide to trading success regardless of the market!

Want to make smarter trading decisions? This strategy-packed, no-nonsense guide presents a proven system for analyzing stocks, trends, and indicators and setting a buy-and-sell range beforehand to decrease your risk in both up and down markets. You'll discover...

Introduction to Project Finance (Essential Capital Markets)
Introduction to Project Finance (Essential Capital Markets)

The term "project finance" is now being used in almost every language in every part of the world. It is the solution to infrastructure, public and private venture capital needs. It has been successfully used in the past to raise trillions of dollars of capital and promises to continue to be one of the major financing techniques for...

Vulnerability Management
Vulnerability Management

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any...

Maximize Your Investment: 10 Key Strategies for Effective Packaged Software Implementations
Maximize Your Investment: 10 Key Strategies for Effective Packaged Software Implementations
Using packaged software for Customer Relationship Management or Enterprise Resource Planning is often seen as a sure-fire way to reduce costs, refocus scarce resources, and increase returns on investment. However, research shows that the majority of packaged or Commercial Off-The-Shelf (COTS) implementations fail to provide this value due to the...
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy