Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Protection: Governance, Risk Management, and Compliance
Data Protection: Governance, Risk Management, and Compliance

Failure to appreciate the full dimensions of data protection can lead to poor data protection management, costly resource allocation issues, and exposure to unnecessary risks. Data Protection: Governance, Risk Management, and Compliance explains how to gain a handle on the vital aspects of data protection.

The author...

Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

Trading For Dummies (Business & Personal Finance)
Trading For Dummies (Business & Personal Finance)

Now updated — your guide to trading success regardless of the market!

Want to make smarter trading decisions? This strategy-packed, no-nonsense guide presents a proven system for analyzing stocks, trends, and indicators and setting a buy-and-sell range beforehand to decrease your risk in both up and down markets. You'll discover...

Managing Successful Projects with PRINCE2 2009 Edition Manual
Managing Successful Projects with PRINCE2 2009 Edition Manual

This publication provides a universally applicable project management method - the principles, processes and techniques that enable individuals and organisations to successfully deliver their projects within time, cost and quality constraints. Managing Successful Projects with PRINCE2 forms part of a pair of publications that are the result...

IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

Implement an Effective Security Metrics Project or Program

IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the...

Patterns-Based Engineering: Successfully Delivering Solutions via Patterns
Patterns-Based Engineering: Successfully Delivering Solutions via Patterns

Successfully delivering Solutions via Patterns

In Patterns-Based Engineering, two leading experts bring together true best practices for developing and deploying successful software-intensive systems. Drawing on their extensive enterprise development experience, the authors clearly show how...

Toxicology and Ecotoxicology in Chemical Safety Assessment
Toxicology and Ecotoxicology in Chemical Safety Assessment

The use of chemicals in any workplace in the developed world is governed by stringent health, safety and environmental legislation, and companies spend significant amounts of time and money assessing the risks associated with the handling and use of chemicals. In practice, those risk assessments are generally carried out by a range of...

Pro PHP Refactoring
Pro PHP Refactoring

Many businesses and organizations depend on older high-value PHP software that risks abandonment because it is impossible to maintain. The reasons for this may be that the software is not well designed; there is only one developer (the one who created the system) who can develop it because he didn’t use common design patterns and...

Electric Power Planning for Regulated and Deregulated Markets
Electric Power Planning for Regulated and Deregulated Markets

As the industry environment transforms from a completely regulated setting to a broader, deregulated marketplace, new market participants must understand planning and operations of power systems to effectively participate in markets.  This industry overview provides a description of utility operations and traditional planning, and then...

Developments and Challenges for Autonomous Unmanned Vehicles: A Compendium
Developments and Challenges for Autonomous Unmanned Vehicles: A Compendium

It is widely anticipated that autonomous vehicles will have a transformational impact on military forces and will play a key role in many future force structures. As a result, many tasks have already been identified that unmanned systems could undertake more readily than humans. However, for this to occur, such systems will need to be agile,...

What Is Nanotechnology and Why Does It Matter: From Science to Ethics
What Is Nanotechnology and Why Does It Matter: From Science to Ethics

Ongoing research in nanotechnology promises both innovations and risks, potentially and profoundly changing the world. This book helps to promote a balanced understanding of this important emerging technology, offering an informed and impartial look at the technology, its science, and its social impact and ethics.

Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from...

Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy