Home | Amazing | Today | Tags | Publishers | Years | Search 
Making Enterprise Information Management (EIM) Work for Business: A Guide to Understanding Information as an Asset
Making Enterprise Information Management (EIM) Work for Business: A Guide to Understanding Information as an Asset

Organizations of all types struggle with information. Millions of dollars are spent on ERP applications to integrate data and yet this data still isn't accessible or relevant. Emails contain hidden liabilities. Safety manuals endanger workers. Worse, there is data and information being created and handled in every nook and cranny of large...

Convergence in Information and Communication Technology: Strategic and Regulatory Considerations
Convergence in Information and Communication Technology: Strategic and Regulatory Considerations

Growth in the information and technology (ICT) sector has exploded over the past 20 years. Dynamic market and technology developments have led to a phenomenon known as convergence, defined in this volume as the erosion of boundaries between previously separate ICT services, networks, and business practices. Examples include cable television...

Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
This book is motivated by the following convictions:

1) Quantitative risk assessment (QRA) can be a powerful discipline for improving risk management decisions and policies.
2) Poorly conducted QRAs can produce results and recommendations that are worse than useless.
3) Sound risk assessment methods provide the benefits of QRA
...
Psychiatric Genetics: Applications in Clinical Practice
Psychiatric Genetics: Applications in Clinical Practice
Psychiatric Genetics is the first book to focus on clinical applications of genetics in psychiatry. It covers issues involved in genetic counseling, the interpretation of familial and genetic information for clinical use, information regarding risks associated with specific psychiatric disorders, and the uses of genetic testing. Written...
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier

"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,...

Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, this guide shows you how to create a workable security program to protect your organization's internet risk. Softcover.

This report from METASeS is written for
...
Going to Extremes: How Like Minds Unite and Divide
Going to Extremes: How Like Minds Unite and Divide
Why do people become extremists? What makes people become so dismissive of opposing views? Why is political and cultural polarization so pervasive in America? Why do groups of teenagers, investors, and corporations take unnecessary risks? What leads groups to engage in such destructive acts as terrorism and ethic cleansing?

In
...
Service Oriented Architecture Field Guide for Executives
Service Oriented Architecture Field Guide for Executives
Service Oriented Architecture Field Guide for Executives is a fundamental breakthrough in the business and technology perspectives of service oriented architecture (SOA). A valuable resource to help you understand and realize the benefits of SOA in today's companies, this guide will show you how to plan, implement, and achieve SOA value....
E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support
E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support
Learn to produce evidence-quality data for legal counsel accurately, efficiently and cost-effectively.

One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI).
...
The Role of Evidence in Risk Characterization: Making Sense of Conflicting Data
The Role of Evidence in Risk Characterization: Making Sense of Conflicting Data
This book is one of the few that focus on the critical problem of the appropriate characterization of conflicting data for an adequate risk evaluation. It comprehensively coves the different approaches in various research areas in the US and in Europe, while also considering the psychological and ethical implications of risk evaluation. Special...
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
Creative Careers in Hollywood
Creative Careers in Hollywood
In this candid guide, entertainment industry veteran Laurie Scheer offers a witty and informative inside look at the primary professions in the movie biz. Readers will discover real-life, yet upbeat portraits of the "shredder" jobs of the industry, such as assistant or d-girl, and how they can lead to the "keeper" jobs of actor,...
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy