Home | Amazing | Today | Tags | Publishers | Years | Search 
Oracle Internals: Tips, Tricks, and Techniques for DBAs
Oracle Internals: Tips, Tricks, and Techniques for DBAs

If you are a typical Oracle professional, you don't have the luxury of time to keep up with new technology and read all the new manuals to understand each new feature of each release of Oracle. You need a comprehensive source of information and techniques for using the new technology. You need Oracle Internals: Tips, Tricks, and...

The Complete Project Management Office Handbook
The Complete Project Management Office Handbook

Today's project managers find themselves in the dual roles of technical expert and business leader. As project management has evolved, the need has emerged for an organizational entity to manage complexities and ensure alignment with business interests. A project management office (PMO) coordinates technical and business facets of project...

Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

The Hands-On Project Office: Guaranteeing ROI and On-Time Delivery
The Hands-On Project Office: Guaranteeing ROI and On-Time Delivery
This text offers processes, techniques, and tools that IT managers can use to immediately improve the delivery of IT products and services.

Economic pressures have forced IT executives to demonstrate the immediate and calculable ROI of new technology deployments. Unfortunately, existing IT service delivery often drifts without serious...

Real Process Improvement Using the CMMI
Real Process Improvement Using the CMMI
This book offers non-academic, real-world approaches to implementing CMMI-based process improvement in an organization. The author identifies critical concepts of CMMI, and details how to turn them into real process improvement.

Real Process Improvement Using the CMMI provides real-world concepts and techniques for CMMI-based...

Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAPcm CBK
Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAPcm CBK
Certification and accreditation has become a major topic of discussion in
the information security arena over the past two to three years, at least
in U.S. government circles. Many government organizations are currently
engaged in employing certification and accreditation processes in response
to the requirements of the Federal
...
The Laws of Software Process
The Laws of Software Process

Within one generation, software has become one of the principal sources of wealth in the world. The development and use of software has grown faster than for any artifact in the history of the world. Probably no topic or subject in history has accelerated in its rate of practice as software has. Software development now needs to mature into a...

Interpreting the CMMI: A Process Improvement Approach
Interpreting the CMMI: A Process Improvement Approach

Written by experienced process improvement professionals who have developed and implemented systems in organizations around the world, Interpreting the CMMI: A Process Improvement Approach provides you with specific techniques for performing process improvement using the CMMI and the family of CMMI models. Kulpa and Johnson describe the...

Wireless Internet Handbook: Technologies, Standards, and Applications
Wireless Internet Handbook: Technologies, Standards, and Applications

Wireless applications are definitely the next big thing in communications. Millions of people around the world use the Internet every day—to stay in touch with remote locations, follow the stock market, keep up with the news, check the weather, make travel plans, conduct business, shop, entertain themselves, and learn. The logical next...

Software Configuration Management
Software Configuration Management

An effective systems development and design process is far easier to explain than it is to implement. A framework is needed that organizes the life cycle activities that form the process. This framework is Configuration Management (CM).

Software Configuration Management discusses the framework from a standards viewpoint, using...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy