Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation,...

The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career
The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career

The role of the business analyst sits at the intersection of business operations, technology, and change management. The job requires a plethora of both soft skills and technical skills, as it must translate the needs of business users into action items for functional applications. On top of this, in-demand technologies...

A Comprehensive Evaluation on Emergency Response in China: The Case of Pandemic Influenza (H1N1) 2009 (Research Series on the Chinese Dream and China’s Development Path)
A Comprehensive Evaluation on Emergency Response in China: The Case of Pandemic Influenza (H1N1) 2009 (Research Series on the Chinese Dream and China’s Development Path)
This book is a third-party evaluation of H1N1 prevention and control effects in China. Based on the characteristic of H1N1 pandemic around the world and current public health management system in China, this book evaluates the comprehensive effects by considering the countermeasures, joint prevent and control mechanism operated by central and...
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
Translating Statistics to Make Decisions: A Guide for the Non-Statistician
Translating Statistics to Make Decisions: A Guide for the Non-Statistician

Examine and solve the common misconceptions and fallacies that non-statisticians bring to their interpretation of statistical results. Explore the many pitfalls that non-statisticians―and also statisticians who present statistical reports to non-statisticians―must avoid if statistical results are to be correctly used for...

Practical AWS Networking: Build and manage complex networks using services such as Amazon VPC, Elastic Load Balancing, Direct Connect, and Amazon Route 53
Practical AWS Networking: Build and manage complex networks using services such as Amazon VPC, Elastic Load Balancing, Direct Connect, and Amazon Route 53

Your one step guide to learn all about AWS networking.

Key Features

  • Master your networking skills on Public Cloud.
  • Gain hands-on experience of using Amazon VPC, Elastic Load Balancing, Direct Connect and other AWS products.
  • Implement troubleshooting skills...
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner

Build distributed applications that resolve data ownership issues when working with transactions between multiple parties

Key Features

  • Explore a perfect balance between theories and hands-on activities
  • Discover popular Blockchain use cases such as Bitcoin
  • ...
Writing Effective Use Cases
Writing Effective Use Cases
Writing use cases as a means of capturing the behavioral requirements of software systems and business processes is a practice that is quickly gaining popularity. Use cases provide a beneficial means of project planning because they clearly show how people will ultimately use the system being designed. On the surface, use cases appear to be a...
Learning Continuous Integration with Jenkins
Learning Continuous Integration with Jenkins

Key Features

  • Speed up and increase software productivity and software delivery using Jenkins
  • Automate your build, integration, release, and deployment processes with Jenkins―and learn how continuous integration (CI) can save you time and money
  • Explore the power of continuous delivery...
Master Data Management (The MK/OMG Press)
Master Data Management (The MK/OMG Press)
The key to a successful MDM initiative isn't technology or methods, it's people: the stakeholders in the organization and their complex ownership of the data that the initiative will affect.

Master Data Management equips you with a deeply practical, business-focused way of thinking about MDM-an understanding that will greatly enhance
...
Microservices: Flexible Software Architecture
Microservices: Flexible Software Architecture

The Most Complete, Practical, and Actionable Guide to Microservices

 

Going beyond mere theory and marketing hype, Eberhard Wolff presents all the knowledge you need to capture the full benefits of this emerging paradigm. He illuminates...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy