 |
|
 |  |  Visual Data Mining: Techniques and Tools for Data Visualization and Mining
Business intelligence solutions transform business data into conclusive, fact-based, and actionable information and enable businesses to spot customer trends, create customer loyalty, enhance supplier relationships, reduce financial risk, and uncover new sales opportunities. The goal of business intelligence is to make sense of change-to... |  |  100 SOA Questions: Asked and Answered
100 SOA Questions brings together authoritative answers to the most crucial questions business, technical, and architectural decision-makers ask about SOA. It draws on the immense experience of two SOA experts who’ve participated in more than 100 SOA projects in the roles of architect, designer,... |
|
 Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... |  |  Audit and Trace Log Management: Consolidation and Analysis
Audit and Trace Log Management: Consolidation and Analysis
is both a timely and much needed compilation of useful information around a topic
that is becoming more and more critical to not only IT professionals and
security practitioners, but to many other departments, such as legal, risk,
and compliance, as well as auditors and... |  |  Web Design for ROI: Turning Browsers into Buyers & Prospects into Leads
This book is a child borne, like many others, of a cosmic combination of
passion, frustration, experience, and luck.
Passion—we quite simply love what we do and care deeply about the results. We hope we’re able to
communicate this in our writing.
Frustration—it seems for every victory we gain with... |
|
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |