Taking a rational approach to implementing Horizon View can make all the difference to its future performance and usefulness. This book will help you make all the right decisions for your particular enterprise's needs.
Overview
Identify the reasons why you are deploying Horizon View, a critical step...
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material,...
Ongoing research in nanotechnology promises both innovations and risks, potentially and profoundly changing the world. This book helps to promote a balanced understanding of this important emerging technology, offering an informed and impartial look at the technology, its science, and its social impact and ethics.
Agile methodologies attack risk at its core. To identify risk early and often is the
premise of agile security. Risk comes in many forms. Organizations face security
threats every day. Risks are in the delivery and maintenance of the countermeasures.
Agile IT Security focuses on the details of the steps in delivering and maintaining...
Learn how to apply test-driven development (TDD) to machine-learning algorithms—and catch mistakes that could sink your analysis. In this practical guide, author Matthew Kirk takes you through the principles of TDD and machine learning, and shows you how to apply TDD to several machine-learning algorithms, including Naive...
In this groundbreaking collection of 15 interviews, successful founders of entertainment software companies reflect on their challenges and how they survived. You will learn of the strategies, the sacrifices, the long hours, the commitment, and the dedication to quality that led to their successes but also of the toll that this incredibly...
Every day we interact with thousands of consumer products. We not only expect them to perform their functions safely, reliably, and efficiently, but also to do it so seamlessly that we don’t even think about it. However, with the many factors involved in consumer product design, from the application of human factors and ergonomics...
Every enterprise requires at least one firewall to provide the backbone for its network security architecture. Firewalls are the core component of your network’s security. The risks today have greatly increased, so the call for a stronger breed of firewall has been made. In the past, simple packet-filtering firewalls allowing...
The requirement to maximise value for shareholders is at the core of any corporate investment or financing decision. The intrinsic value of proposed investments should be assessed before deciding how much capital to allocate; the benefits and risks associated with each available source of finance should be considered when capital is being...
Dietary cancer prophylaxis is based on the detailed knowledge of carcinogenic and anticarcinogenic properties of food constituents. Although much data has been collected on these elements, an understanding of the causal mechanisms that link diet and cancer is still evolving. Carcinogenic and Anticarcinogenic Food Components explains the broad...
Most of the project management books on the market are basically textbooks. They are dry to begin with, and don't focus on the practical advice that most people need to run their projects. Lessons in Project Management, Second Edition does not assume that you are a project manager building a nuclear reactor or sending a...
Get up to speed with new strategies, tools, and resources
Gain control of your investments and pay less in fees and commissions — here's how
Whether you've invested online before or you're planning to start, this plain-English guide will steer you around the jargon and past the pitfalls. Uncover the best investing resources...