Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Information technologies are becoming pervasive and powerful to the point that the privacy of citizens is now at risk. Indeed, more and more of our daily transactions are conducted electronically and require us to transmit personal information. Examples include using an electronic identity card to prove one’s age in a...
Pro VB 2005 and the .NET 2.0 Platform, Second Edition
Pro VB 2005 and the .NET 2.0 Platform, Second Edition
The initial release of the .NET platform (circa 2001) caused quite a stir within the Visual Basic programming community. One the one hand, many die-hard VB 6.0 developers were up in arms at the major differences between VB 6.0 and Visual Basic .NET. Individuals in this group were a bit stunned to see that VB .NET was not in fact “VB...
Windows 2000(r) Active Directory Survival Guide: Planning and Implementation
Windows 2000(r) Active Directory Survival Guide: Planning and Implementation
The biggest challenge and opportunity for IS departments approaching Windows 2000 is probably Active Directory (AD), which can reduce total cost of ownership (TCO) and simplify administration. For any IS professional or administrator, Windows 2000 Active Directory Survival Guide provides both a high-level introduction and a hands-on guide...
The Concise Encyclopedia of Statistics
The Concise Encyclopedia of Statistics

With this concise volume we hope to satisfy the needs of a large scientific community previously served mainly by huge encyclopedic references. Rather than aiming at a comprehensive coverage of our subject, we have concentrated on the most important topics, but explained those as deeply as space has allowed. The result is a compactwork...

101 Internet Businesses You Can Start from Home: How to Choose and Build Your Own Successful e-Business
101 Internet Businesses You Can Start from Home: How to Choose and Build Your Own Successful e-Business
Communicating with customers and other businesses has changed dramatically over the past century. It started with print, then radio, television, phone, and fax, and now all of us are operating in the fastest medium yet—the Internet. The future is bright for businesses that utilize the Net as a primary medium of communication and sales....
Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Practical DataOps: Delivering Agile Data Science at Scale
Practical DataOps: Delivering Agile Data Science at Scale
Gain a practical introduction to DataOps, a new discipline for delivering data science at scale inspired by practices at companies such as Facebook, Uber, LinkedIn, Twitter, and eBay. Organizations need more than the latest AI algorithms, hottest tools, and best people to turn data into insight-driven action and useful...
Supply Chain Imperative, The: How to Ensure Ethical Behavior in Your Global Suppliers
Supply Chain Imperative, The: How to Ensure Ethical Behavior in Your Global Suppliers

Like many companies in all industries, yours is making an admirable new commitment to higher ethical standards. You’ve worked hard to build or restore your reputation and the trust of your stakeholders. But all your best efforts may be undermined if the many links in your supply chain do not follow suit.

The Supply Chain...

Web Security, Privacy and Commerce, 2nd Edition
Web Security, Privacy and Commerce, 2nd Edition
The World Wide Web has changed our world. More than half the people in the United States now use the Web on a regular basis. We use it to read today's news, to check tomorrow's weather, and to search for events that have happened in the distant past. And increasingly, the Web is the focus of the 21st century...
Credit and Community: Working-Class Debt in the UK since 1880
Credit and Community: Working-Class Debt in the UK since 1880
Credit's centrality to the current economic crisis makes the publication of Sean O'Connell's social history of working-class credit consumption particularly timely. Although the credit crunch came too late to be included in this book, the portrait of a complex relationship between lenders and borrowers over the past 120 years should be required...
Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Trust, Institutions and Managing Entrepreneurial Relationships in Africa: An SME Perspective (Palgrave Studies of Entrepreneurship in Africa)
Trust, Institutions and Managing Entrepreneurial Relationships in Africa: An SME Perspective (Palgrave Studies of Entrepreneurship in Africa)

This book highlights the importance of understanding how trust and indigenous African cultural institutions enhance the development of entrepreneurial networks and relationships in Africa. Drawing on institutional theories, the author re-examines the way that entrepreneurial behaviour can be shaped, with a focus on trust, networks...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy