 |
|
 Data Protection: Governance, Risk Management, and ComplianceFailure to appreciate the full dimensions of data protection can lead to poor data protection management, costly resource allocation issues, and exposure to unnecessary risks. Data Protection: Governance, Risk Management, and Compliance explains how to gain a handle on the vital aspects of data protection.
The author... |  |  Software & Systems Requirements Engineering: In PracticeProven Software & Systems Requirements Engineering Techniques
"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced... |  |  Trading For Dummies (Business & Personal Finance)Now updated — your guide to trading success regardless of the market!
Want to make smarter trading decisions? This strategy-packed, no-nonsense guide presents a proven system for analyzing stocks, trends, and indicators and setting a buy-and-sell range beforehand to decrease your risk in both up and down markets. You'll discover... |
|
|
|
 Developments and Challenges for Autonomous Unmanned Vehicles: A Compendium
It is widely anticipated that autonomous vehicles will have a transformational impact on military forces and will play a key role in many future force structures. As a result, many tasks have already been identified that unmanned systems could undertake more readily than humans. However, for this to occur, such systems will need to be agile,... |  |  What Is Nanotechnology and Why Does It Matter: From Science to Ethics
Ongoing research in nanotechnology promises both innovations and risks, potentially and profoundly changing the world. This book helps to promote a balanced understanding of this important emerging technology, offering an informed and impartial look at the technology, its science, and its social impact and ethics.
|  |  Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from... |
|
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 |