Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managing Successful Projects with PRINCE2 2009 Edition Manual
Managing Successful Projects with PRINCE2 2009 Edition Manual

This publication provides a universally applicable project management method - the principles, processes and techniques that enable individuals and organisations to successfully deliver their projects within time, cost and quality constraints. Managing Successful Projects with PRINCE2 forms part of a pair of publications that are the result...

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
Beating IT Risks
Beating IT Risks
Beating IT Risks is quite different in perspective from beating a drum – which
tends to be monotonal. The book is more like a entire symphony in which all
of the voices are in intricate interrelationships. Enabling the reader to learn to
understand the big picture as well as the details is perhaps its most significant...
Chemical Risk Assessment: A Manual for REACH
Chemical Risk Assessment: A Manual for REACH

This book is an essential guide and support to understanding of the science and policy, procedure and practice that underpins the REACH risk assessments required for the use and placing on the market of chemicals in the European Union. A clear understanding of information provision and how this affects the assessment of chemical safety...

UNIX to Linux(R) Porting : A Comprehensive Reference (Prentice Hall Open Source Software Development)
UNIX to Linux(R) Porting : A Comprehensive Reference (Prentice Hall Open Source Software Development)

Port Your UNIX® Applications to Linux®–Quickly, Efficiently, and Reliably

Increasingly, developers, architects, and project managers face the challenge of porting their C, C++, and Java applications from UNIX® to Linux® environments. Now,...

The Radiation Therapy of Benign Diseases: Current Indications and Techniques 33rd San Francisco Cancer Symposium, San Francisco, Calif., April 1999 ... of Radiation Therapy and Oncology, Vol. 35)
The Radiation Therapy of Benign Diseases: Current Indications and Techniques 33rd San Francisco Cancer Symposium, San Francisco, Calif., April 1999 ... of Radiation Therapy and Oncology, Vol. 35)

This volume discusses radiotherapy and its role in the treatment of benign diseases. Its intent is to broaden the application of radiotherapy beyond malignancy to treat a range of clinical concerns, from minor skin problems to life-threatening arterial disease. In addition, it aims to encourage medical practitioners to consider the benefits...

Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
Handbook of Enterprise Systems Architecture in Practice
Handbook of Enterprise Systems Architecture in Practice
I am not sure exactly when the importance of enterprise architecture (EA) dawned on me. What is clear is that it wasn’t a “one fine day” realization, rather a result of numerous conversations with CIOs, IT managers, CFOs, process managers, and multiple research studies that convinced me that EA is perhaps the most important and...
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
Moving to Linux®: Kiss the Blue Screen of Death Goodbye! Second Edition
Moving to Linux®: Kiss the Blue Screen of Death Goodbye! Second Edition

Say Goodbye to Windows®-Related Crashes, Viruses, Hassles, and Costs!

Today, Linux is more powerful, useful, and practical than ever before! Moving to Linux, Second...

Building Secure Servers with Linux
Building Secure Servers with Linux
Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some...
unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy