Welcome to the Yammer Starter. This book has been especially created to provide
you with all the information that you need to get set up with Yammer. You will
learn the basics of Yammer, get started with building your profile, and discover
some tips and tricks for using Yammer.
Conventional wisdom dictates that Vim has a steep learning curve. I think
most Vim users would disagree. Sure, there’s an initial hump, but once you
run through vimtutor and learn the basics of what to put in your vimrc, you
reach a point where you can actually get work done—a sort of hobbled...
The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...
The intention of this book is to provide a thorough reference for those considering a migration
into the virtualized world. The majority of our target readers will likely be seasoned system
administrators and engineers who grew up in and still manage primarily a hardware-based
server environment containing a large assortment of both...
In 2002, Web services were a hot topic and the concept of serviceoriented
architecture (SOA), while not a new idea, was beginning to
pick up steam. It did not take long for organizations to realize that
Web services mandated the concept and organizational model of SOA
to guide their selection, design, implementation, and management....
Sams Teach Yourself Facebook® for Business in 10 Minutesgives you straightforward, practical answers when you need fast results. By working through its 10-minute lessons, you’ll learn how to profit from Facebook’s powerful new business tools: Facebook Pages, Places, Deals, Ads, and...
Social media can be an incredibly powerful marketing tool that brings a company or organization huge rewards. But for beginners in this new world, the potential risks are also high. Consumers are particularly passionate in the online world; the most active social networkers are poised to be your brand's gushing fans—or your most...
Competing in today's world requires a greater emphasis on strategy, long-range planning, and decision making, and this is why businesses are building data warehouses. Data warehouses are becoming more and more common as businesses have realized the need to mine the information that is stored in electronic form. Data warehouses provide...
As rising levels of mercury in the environment pose an increasing threat of toxicity to humans and wildlife, several laws already call for industries to reduce mercury emissions at the source. Ecosystem Responses to Mercury Contamination: Indicators of Change outlines the infrastructure and methods needed to measure, monitor, and regulate the...
Oracle RAC or Real Application Clusters is a grid computing solution that allows multiple nodes (servers) in a clustered system to mount and open a single database that resides on shared disk storage. Should a single system (node) fail, the database service will still be available on the remaining nodes. Oracle RAC is an integral part of the...
Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...