Home | Amazing | Today | Tags | Publishers | Years | Search 
Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness
Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Antioxidants and the Skin: Second Edition
Antioxidants and the Skin: Second Edition
This highly illustrated book brings together many concepts related to skin care and antioxidant usage in one convenient text. The second edition now contains the latest antioxidants being marketed, and an analysis of risks and benefits associated.

Exposure to solar radiation, other environmental insults, and...
The Exponential Era: Strategies to Stay Ahead of the Curve in an Era of Chaotic Changes and Disruptive Forces
The Exponential Era: Strategies to Stay Ahead of the Curve in an Era of Chaotic Changes and Disruptive Forces
This book introduces the Exponential Era, the extraordinary times we are living where the convergence of technology platforms that grow at exponential rates is creating unprecedented opportunities for companies that know how to benefit from it, and disastrous results for those that don't.
 
 In the
...
Authentication and Access Control: Practical Cryptography Methods and Tools
Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most notably in communications between users, servers, and devices. Unfortunately, this has led to many security challenges and problems. Recent examples include password leakage on large social network sites and defacement of websites. It is, therefore,...
Artificial Intelligence for Finance Executives: The AI revolution, from industry trends and case studies to algorithms and concepts
Artificial Intelligence for Finance Executives: The AI revolution, from industry trends and case studies to algorithms and concepts

We often hear that AI is revolutionising the financial sector, like no other technology has done before. This book looks beyond these clichés and explores all aspects of this transformation at a deep level. It spells out a vision for the future and answers many questions that are routinely ignored.

...

Ahead of Her Time: How a One-Woman Startup Became a Global Publishing Brand (Conscious Leadership i n Practice)
Ahead of Her Time: How a One-Woman Startup Became a Global Publishing Brand (Conscious Leadership i n Practice)
Inspiring memoir by entrepreneur Judy Piatkus, who launched her startup at a time when mothers were not expected to be businesswomen and grew it into a highly successful international brand. The story of a pioneer of female entrepreneurship, values-led management and the rise of personal development publishing.

Judy
...
Atmosphere of Collaboration: Air Pollution Science, Politics and Ecopreneurship in Delhi
Atmosphere of Collaboration: Air Pollution Science, Politics and Ecopreneurship in Delhi

This book discusses air pollution in Delhi from scientific, social and entrepreneurial perspectives. Using key debates and interventions on air pollution, it examines the trajectories of environmental politics in the Delhi region, one of the most polluted areas in the world. It highlights the administrative struggles, public...

Solving for Project Risk Management: Understanding the Critical Role of Uncertainty in Project Management
Solving for Project Risk Management: Understanding the Critical Role of Uncertainty in Project Management

Risk is real?but you can manage it with this hard-hitting guide to reducing risk on any project, in any industry

All projects, large and small, are subject to various risks. But the failure to manage inherent risk with diligence and know-how can lead to devastating consequences for an organization. In this...

Antimicrobials in Livestock 1: Regulation, Science, Practice: A European Perspective
Antimicrobials in Livestock 1: Regulation, Science, Practice: A European Perspective
This first volume in a two-volume work enhances readers’ understanding of antimicrobial resistance mechanisms in selected bacterial species that cause diseases in major food producing animals. It provides an overview of the current legislation and policies seeking to regulate the authorisation, manufacturing,...
Project Management and Engineering Research: AEIPRO 2017 (Lecture Notes in Management and Industrial Engineering)
Project Management and Engineering Research: AEIPRO 2017 (Lecture Notes in Management and Industrial Engineering)
This is the Proceedings of the 20th International Congress on Project Management and Engineering, that was held at the Technical University of Cartagena, Spain, from July 13 to 15, 2016. It brings together a collection of recent works of researchers and professionals in the Project Management and Engineering fields of Civil Engineering and...
Big Breaches: Cybersecurity Lessons for Everyone
Big Breaches: Cybersecurity Lessons for Everyone
Neil and Moudy have written a book that will help us reduce our exposure as a society to future “big breaches” but also to many of the technology risks we face in an increasingly digitized society. They do this not by presenting a “recipe” for success but by making the subject accessible to audiences who...
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy