Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources...
RF and Microwave Semiconductor Device Handbook
RF and Microwave Semiconductor Device Handbook
The purpose of the CRC RF & Microwave Semiconductor Device Handbook is to provide a single volume comprehensive reference for high frequency semiconductor devices. It is intended to be a starting point for programs involving development, technology comparison, or acquisition for RF and wireless semiconductor devices. The articles that comprise...
Wind and Solar Power Systems: Design, Analysis, and Operation, Second Edition
Wind and Solar Power Systems: Design, Analysis, and Operation, Second Edition
- K.G. Craig, Journal of Environmental Quality, 2006

Throughout the text, it is abundantly clear the author is a knowledgeable engineer with considerable experience in the diverse sciences and technologies that provide the foundations of wind and photovoltaic power generation. It is also obvious that he is an experienced teacher, because
...
IS Management Handbook, 8th Edition
IS Management Handbook, 8th Edition
The first few years of the new millennium have been a challenging time for the information technology (IT) manager. The initial economic euphoria that greeted the successful completion of Y2K projects worldwide was quickly followed by a dramatic shakedown within U.S.-based industries most closely related to the growth of the Internet. Today,...
Asset Protection and Security Management Handbook
Asset Protection and Security Management Handbook
Overall an excellent book, a lot of valuable information…I would give the book 9 out of a possible 10 stars … Well organized and well written, the ideas and concepts flow in a methodical and progressive manner. … for those who have an interest in the subject matter, the book is a pleasure to read. …Excellent and...
Nutritional Counseling for Lifestyle Change
Nutritional Counseling for Lifestyle Change
With all of the information available why do patients still have difficulty sticking to their diets? Nutrition Counseling for Lifestyle Change provides clinicians with easy-to-follow instructions on how to change dietary behavior. The book uses examples from work completed in actual patient settings and emphasizes why a strategy...
Wind and Solar Power Systems
Wind and Solar Power Systems
- K.G. Craig, Journal of Environmental Quality, 2006

Throughout the text, it is abundantly clear the author is a knowledgeable engineer with considerable experience in the diverse sciences and technologies that provide the foundations of wind and photovoltaic power generation. It is also obvious that he is an experienced teacher, because
...
The Ethical Hack: A Framework for Business Value Penetration Testing
The Ethical Hack: A Framework for Business Value Penetration Testing

This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required...

Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

Mobile Internet: Enabling Technologies and Services
Mobile Internet: Enabling Technologies and Services
The migration of the most common Internet services to a mobile environment has long been an evolving
demand of both business and consumer markets. The ability to be connected to the Internet while on
the go and to benefit from using such applications as e-mail, instant messaging, audio and video
streaming, Web browsing, and
...
Interpreting the CMMI: A Process Improvement Approach
Interpreting the CMMI: A Process Improvement Approach

Written by experienced process improvement professionals who have developed and implemented systems in organizations around the world, Interpreting the CMMI: A Process Improvement Approach provides you with specific techniques for performing process improvement using the CMMI and the family of CMMI models. Kulpa and Johnson describe the...

Introduction to Fuzzy Sets, Fuzzy Logic, and Fuzzy Control Systems
Introduction to Fuzzy Sets, Fuzzy Logic, and Fuzzy Control Systems
The book would certainly provide a sound and systematic introductionClearly and thoroughly written, it admirably meets the authors' stated goals and definitely deserves a place in the library of all institutions where courses on fuzzy systems and allied topics are taught. An excellent introduction to these fields via self-study.
-R. Bharath,
...
Result Page: Previous 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy