 |
|
|
 Managing Risk and Information Security: Protect to Enable
Newly promoted CISOs rapidly realize that the scope of the position they have taken on
is often beyond what they have been prepared for. The nature of securing an enterprise
is daunting and overwhelming. There are no simple checklists or roadmaps for success.
Many of the technical security skills a CISO has acquired during the early... |  |  |  |  |
|
 Patterns, Programming and Everything
With 11 invited submissions from leading researchers and teams of researchers sharing one common characteristic ? all have worked with Dr. Judith Bishop during her long and continuing career as a leader in computer science education and research ? this book reflects on Dr Bishop?s outstanding contribution to computer science.... |  |  The Belbin Guide to Succeeding at Work
Have you ever been overtaken at work by someone with fewer qualifications? Have you ever wondered how some people move effortlessly up the career ladder, while others stall at each rung?
Drawing on 27 years' experience since the publication of Meredith Belbin's bestselling book, Management Teams - Why They... |  |  Numerical Analysis in Electromagnetics: The TLM Method (ISTE)
The aim of this book is to give a broad overview of the TLM (Transmission Line Matrix) method, which is one of the “time-domain numerical methods”. These methods are reputed for their significant reliance on computer resources. However, they have the advantage of being highly general.
The TLM method has acquired a... |
|
|
| Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 |