Home | Amazing | Today | Tags | Publishers | Years | Search 
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
The 2nd Digital Revolution
The 2nd Digital Revolution
In the 1990s I sat in the office of a CFO of what was then a Fortune 100
company. He was not happy about the annual technology bill. Back then –
and for decades before – technology was tactical. He said something about
technology being his last unmanaged expense. I gave him a list of 10 things
we should do to improve
...
Technology Blueprints: Technology Foundations for High Performance Companies
Technology Blueprints: Technology Foundations for High Performance Companies
In the present era of the post "new economy," scores of successful companies are now tending more than ever to steer away from the old model of extreme reward by extreme speculation. While innovation thrives today, it is focused on the fundamentals of value and high performance. Technology blueprints are concrete, proven tactical and...
How to Cheat at Managing Information Security
How to Cheat at Managing Information Security
Information security is different from many other disciplines both within mainstream
information technology and other business areas. Even though there are
now many good books on various areas, getting the breadth of knowledge
across the many subareas is still difficult, but it is essential to success.

Unlike so many
...
Search Engine Marketing, Inc.: Driving Search Traffic to Your Company's Web Site
Search Engine Marketing, Inc.: Driving Search Traffic to Your Company's Web Site
Effective search engine optimization (SEO) and search engine marketing (SEM) is now crucial to the success of your business. But it's never been more challenging—especially if you're responsible for a large, complex site. Finally, there's a definitive source for reliable information for implementing an effective search engine optimization and...
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design
Here are those little gems of advice that a skilled mentor who peered over your shoulder would tell you. If you lack such a mentor, this book is the next best thing, explaining just what you need to do in a straightforward, easy-to-read, easy-to-understand manner.

--Don Norman, Nielsen Norman group, Prof., Northwestern
...
Implementing IBM(R) Rational(R) ClearQuest(R): An End-to-End Deployment Guide (The developerWorks Series)
Implementing IBM(R) Rational(R) ClearQuest(R): An End-to-End Deployment Guide (The developerWorks Series)

IBMВ® RationalВ® ClearQuestВ® gives organizations unprecedented control over software development, helping them fix defects, make enhancements, manage issues, update documentation, and deliver better products, faster. Now there's an easy-to-use ClearQuest deployment guide for every team member--in development, product...

Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualization: A powerful technique for achieving high performance

Complex systems do not require complex project management. The most effective project managers are able to simplify their project environment and organize projects, large and small, to achieve predictable results. This book explains how anyone responsible for a project can apply...

Multicriteria Scheduling: Theory, Models and Algorithms
Multicriteria Scheduling: Theory, Models and Algorithms
Scheduling theory first appears in the mid 1950s. Since then the problems
addressed become closer to industrial applications, thus increasing in complexity.
The layout of the shops taken into account are closer and closer to
those met in practice: we encounter shops where the machines are found in
different multiple copies,
...
Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Mastering the Art of Equity Trading Through Simulation, + Web-Based Software: The TraderEx Course (Wiley Trading)
Mastering the Art of Equity Trading Through Simulation, + Web-Based Software: The TraderEx Course (Wiley Trading)

An interactive guide to successfully trading in today's markets

Mastering the Art of Equity Trading Through Simulation is a guidebook to interactive computer trading simulation designed to provide participants with hands-on experience in making tactical decisions and implementing them in different market...

Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy