Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Visual Six Sigma: Making Data Analysis Lean (Wiley and SAS Business Series)
Streamline data analysis with an intuitive, visual Six Sigma strategy

Visual Six Sigma provides the statistical techniques that help you get more information from your data. A unique emphasis on the visual allows you to take a more active role in data-driven decision making, so you can leverage your contextual...

Predictive Analytics For Dummies
Predictive Analytics For Dummies

Combine business sense, statistics, and computers in a new and intuitive way, thanks to Big Data Predictive analytics is a branch of data mining that helps predict probabilities and trends. Predictive Analytics For Dummies explores the power of predictive analytics and how you can use it to make valuable predictions for your business, or in...

RESTful Web Services
RESTful Web Services

"Every developer working with the Web needs to read this book." -- David Heinemeier Hansson, creator of the Rails framework

"RESTful Web Services finally provides a practical roadmap for constructing services that embrace the Web, instead of trying to route around it." -- Adam Trachtenberg, PHP author and
...

Autonomous Mobile Robots: Sensing, Control, Decision Making and Applications (Control Engineering)
Autonomous Mobile Robots: Sensing, Control, Decision Making and Applications (Control Engineering)
It has long been the goal of engineers to develop tools that enhance our ability to do work, increase our quality of life, or perform tasks that are either beyond our ability, too hazardous, or too tedious to be left to human efforts. Autonomous mobile robots are the culmination of decades of research and development, and their potential is...
Building Websites All-in-One For Dummies
Building Websites All-in-One For Dummies

Ten minibooks in one! The perfect reference for beginning web builders

This hefty, 800+ page book is your start-to-finish roadmap for building a web site for personal or professional use. Even if you're completely new to the process, this book is packed with everything you need to know to build an attractive, usable, and...

Practical Guide to Neck Dissection
Practical Guide to Neck Dissection

This brilliantly illustrated manual on neck dissection is a roadmap for advanced surgeons and beginners alike. It guides the reader through the cervical structures with practical step-by-step exercises. The illustrations provide an overview of all relevant surgical anatomy important for the identification and treatment of oncologic patients....

Implementing ITIL Configuration Management
Implementing ITIL Configuration Management
Practical, Real-World ITIL Configuration Management–From Start to Finish

 

The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively,...

The Art of Agile Development
The Art of Agile Development

The Art of Agile Development contains practical guidance for anyone considering or applying agile development for building valuable software. Plenty of books describe what agile development is or why it helps software projects succeed, but very few combine information for developers, managers, testers, and customers into a single...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

XSLT Cookbook, Second Edition
XSLT Cookbook, Second Edition

Forget those funky robot toys that were all the rage in the '80s, XSLT (Extensible Stylesheet Transformations) is the ultimate transformer. This powerful language is expert at transforming XML documents into PDF files, HTML documents, JPEG files--virtually anything your heart desires. As useful as XSLT is, though, most people...

Transportation Management with SAP TM 9: A Hands-on Guide to Configuring, Implementing, and Optimizing SAP TM
Transportation Management with SAP TM 9: A Hands-on Guide to Configuring, Implementing, and Optimizing SAP TM

The implementation of a TMS solution is a highly complex and mission critical project. If executed correctly a good TMS can deliver a number of benefits to the organization in terms of optimization, greater efficiency, reduced errors and improved revenue through accurate invoicing. However a number of projects fail to realize these...

Result Page: 21 20 19 18 17 16 15 14 13 12 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy