|
|
|
| | | | New Directions in Project Management (Best Practices)Organizations that rely on computing technology for survival understand the critical importance of managing projects that meet strategic goals and objectives. The diversity of business globalization and electronic commerce combined with the unceasing pace of technical change continues to challenge efforts for more proficient project management... |
|
|
Security of Mobile CommunicationsThe explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.
Providing technicians and designers with a... | | Design and Implementation of Data Mining ToolsFocusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors’ own research work, the book takes a practical approach to the... | | Vulnerability ManagementAs old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any... |
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |