|
|
|
|
|
A Practical Guide to Trusted ComputingUse Trusted Computing to Make PCs Safer, More Secure, and More Reliable
Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes... | | IT Disaster Recovery Planning For Dummies (Computer/Tech)Create a safety net while you work out your major plan
Identify critical IT systems, develop a long-range strategy, and train your people
Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back... | | Making IT Count: Strategy, Delivery, Infrastructure (Computer Weekly Professional)'Making IT Count: from strategy to implementation' focuses on the practical elements of delivering Information Technology strategy. Studies regularly show that over half of Information Technology strategies are never implemented, or are unsuccessful in delivering the desired results, and that a significant percentage of strategies implemented... |
|
Corporate Restructuring: From Cause Analysis to Execution
Corporate Restructuring is a practical approach to rescuing troubled companies and driving underperforming companies to top performance. It combines proven restructuring strategies with rigorous theoretical analysis. This book explains how to set and achieve asset, staffing, sales and profit goals. Topics include diagnostic tools to identify... | | ITIL Service Design 2011 Edition
The ITIL 2011 Editions have been updated for clarity, consistency, correctness and completeness. In order to meet current and future business requirements, ITIL Service Design provides guidance on the production and maintenance of IT policies, architectures and documents for the design of appropriate and innovative IT infrastructure services... | | The Social Media Bible: Tactics, Tools, and Strategies for Business Success
The bestselling bible for social media is now completely revised and updated!
The Social Media Bible, Second Edition (www.TSMB2.com) is the most comprehensive resource that transforms the way corporate, small business, and non-profit companies use social media to reach their desired audiences with power messages and... |
|
Java Enterprise in a NutshellNothing is as constant as change, and this is as true in enterprise computing as anywhere else. With the recent release of Java 2 Enterprise Edition 1.4, developers are being called on to add even greater, more complex levels of interconnectivity to their applications.
To do this, Java developers... | | Patterns of Agile Practice Adoption
As more and more people move towards adoption of Agile practices, they are looking for guidance and advice on how to adopt Agile successfully. Unfortunately many of the questions they have such as: "Where do I start?", "What specific practices should I adopt?", "How can I adopt incrementally?" and "Where can... | | CIO Best Practices: Enabling Strategic Value with Information TechnologyIf you are a CIO, or intend to become a CIO, or simply want to understand the strategic importance of IT for your entire enterprise, CIO Best Practices provides you with the best practice guidance on the key responsibilities of the CIO and its important role in modern organizations. This is the most definitive and important work you will... |
|
|
Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 |