Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Ajax: Architecture and Best Practices
Advanced Ajax: Architecture and Best Practices
“I very much enjoyed how this book covers the full Ajax application lifecycle and not only coding techniques. Anyone who is looking to become a professional front-end developer will appreciate the architectural insight and best practices delivered by this book.”  — Andi Gutmans, Co-Founder & Co-Chief...
Under Control: Governance Across the Enterprise
Under Control: Governance Across the Enterprise

With the economic crisis that began in 2008, a long-standing trend toward increased regulation is becoming a flood. The clamor for improved enterprise risk management and the complexity of multinational compliance present executives with a dramatically new array of challenges.

Governance should offer solutions, but it is clear that...

Absolute Beginner's Guide to Personal Firewalls
Absolute Beginner's Guide to Personal Firewalls

The Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal...

Reinventing Financial Regulation: A Blueprint for Overcoming Systemic Risk
Reinventing Financial Regulation: A Blueprint for Overcoming Systemic Risk

Reinventing Financial Regulation offers an analysis of the fundamental flaws that plague the current system of financial regulation, one built around ideas of "risk-sensitivity" and "capital adequacy." Author Avinash Persaud argues that while some sensible reforms have been introduced, a fresh...

Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
CISSP All-in-One Exam Guide, Second Edition
CISSP All-in-One Exam Guide, Second Edition
This book is intended to welcome you to the exciting world of security and start you on a new path toward obtaining your CISSP certification!

The Certified Information Systems Security Professional (CISSP) exam covers ten domains, each of which may be considered a full field of study in itself, with many individual books and papers
...
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the...
The Entrepreneur's Guide to Managing Information Technology
The Entrepreneur's Guide to Managing Information Technology
Software. Hardware. Networks. Wireless. Entrepreneurs face a bewildering array of choices and decisions when it comes to incorporating technology into the fabric of their businesses. Yet nothing could be more important these days. Aligning information technology (IT) with business strategy is essential to meet and beat the competition. As business...
Make Yourself a Millionaire : How to Sleep Well and Stay Sane on the Road to Wealth
Make Yourself a Millionaire : How to Sleep Well and Stay Sane on the Road to Wealth
Praise for Make Yourself a Millionaire:

"Charles Zhang is a true American success story. His hard work and dedication to providing highquality financial advice is legendary within American Express. This book is a great roadmap for those who want to reach their dreams. It is a must read."--Ken Chenault,...

Internet-based Control Systems: Design and Applications (Advances in Industrial Control)
Internet-based Control Systems: Design and Applications (Advances in Industrial Control)

The Internet plays a significant and growing role in real-time industrial manufacturing, scheduling and management. A considerable research effort has led to the development of new technologies that make it possible to use the Internet for supervision and control of industrial processes.

Internet-based Control Systems...

Food Chemical Risk Analysis (Food Science & Safety Series)
Food Chemical Risk Analysis (Food Science & Safety Series)

The recognition that chemicals in food, whatever their origin, might present a risk to the consumer has long been recognised. However, early food regulations at the beginning of the century were primarily aimed at prevention of adulteration and fraud rather than directed at consumer safety. It is only in the second half of the century...

Project Management with the IBM(R) Rational Unified Process(R): Lessons From The Trenches
Project Management with the IBM(R) Rational Unified Process(R): Lessons From The Trenches
The Hands-On, Start-to-Finish Guide to Managing Software Projects with the IBM® Rational Unified Process®

 

This is the definitive guide to managing software development projects with the IBM Rational Unified Process (RUP®). Drawing on his...

unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy