Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

This book is designed to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints of what many are calling cyber warfare today. One comes from a commercial background and the other brings the military viewpoint. The book is designed to help...

Chess For Dummies
Chess For Dummies
It was inevitable, thank goodness, that the Dummies series would give us an introductory chess book. The light touch is perfect to offset the sober aura of mystery that surrounds the game in many people's minds. And the extras that reach beyond the well-written move explanations, strategies, and pattern-recognition make the book a real...
Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

Trading Between the Lines: Pattern Recognition and Visualization of Markets
Trading Between the Lines: Pattern Recognition and Visualization of Markets

Insights into a pattern-based method of trading that can increase the likelihood of profitable outcomes

While most books on chart patterns, or pattern recognition, offer detailed discussion and analysis of one type of pattern, the fact is that a single pattern may not be very helpful for trading, since it often does not give a...

Mastering the Art of Equity Trading Through Simulation, + Web-Based Software: The TraderEx Course (Wiley Trading)
Mastering the Art of Equity Trading Through Simulation, + Web-Based Software: The TraderEx Course (Wiley Trading)

An interactive guide to successfully trading in today's markets

Mastering the Art of Equity Trading Through Simulation is a guidebook to interactive computer trading simulation designed to provide participants with hands-on experience in making tactical decisions and implementing them in different market...

Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
People-Focused Knowledge Management: How Effective Decision Making Leads to Corporate Success
People-Focused Knowledge Management: How Effective Decision Making Leads to Corporate Success
The business environment has changed. Sharper competition requires organizations to exhibit greater effectiveness in their operations and services and faster creation of new products and servicesall hallmarks of the knowledge economy. Up until now, most of the knowledge management literature has focused on technology, systems, or culture. This book...
Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualization: A powerful technique for achieving high performance

Complex systems do not require complex project management. The most effective project managers are able to simplify their project environment and organize projects, large and small, to achieve predictable results. This book explains how anyone responsible for a project can apply...

Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services

In these days of shortened fiscal horizons and contracted time-to-market schedules, traditional approaches to capacity planning are often seen by management as tending to inflate their production schedules. Rather than giving up in the face of this kind of relentless pressure to get things done faster, Guerrilla Capacity Planning facilitates...

Result Page: 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy