Home | Amazing | Today | Tags | Publishers | Years | Search 
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...

Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization

The intention of this book is to provide a thorough reference for those considering a migration into the virtualized world. The majority of our target readers will likely be seasoned system administrators and engineers who grew up in and still manage primarily a hardware-based server environment containing a large assortment of both...

Low Power CMOS VLSI: Circuit Design
Low Power CMOS VLSI: Circuit Design

The scaling of silicon technology has been ongoing for over forty years. We are on our way to commercializing devices having a minimum feature size of one-tenlh of a micron. The push for miniaturization comes from the demand for higher functionality and higher performance at a lower cost. As a result, successively higher levels of...

Software Testing and Continuous Quality Improvement, Third Edition
Software Testing and Continuous Quality Improvement, Third Edition

Numerous textbooks address software testing in a structured development environment. By “structured” is meant a well-defined development cycle in which discretely defined steps provide measurable outputs at each step. It is assumed that software testing activities are based on clearly defined requirements and software...

Introduction to Data Mining Using SAS Enterprise Miner
Introduction to Data Mining Using SAS Enterprise Miner

If you have an abundance of data, but no idea what to do with it, this book was written for you! Packed with examples from an array of industries, Introduction to Data Mining Using SAS Enterprise Miner provides you with excellent starting points and practical guidelines to begin data mining today. Author Patricia Cerrito encourages you to...

Windows Small Business Server 2011 Administrator's Pocket Consultant
Windows Small Business Server 2011 Administrator's Pocket Consultant

When local area networks (LANs) first appeared in the business world, their primary functions were to share files and printers. These are still critical applications for most business networks, but networks are able to provide many other functions as well. Virtually all business owners want to provide their users with access to the...

Advanced Topics in Computational Partial Differential Equations: Numerical Methods and Diffpack Programming
Advanced Topics in Computational Partial Differential Equations: Numerical Methods and Diffpack Programming

This book is about solving partial differential equations (PDEs) . Such equations are used to model a wide range of phenomena in virtually all fields of science and technology. In the last decade, the general availability of extremely powerful computers has shifted the focus in computational mathematics from simplified model problems...

Getting Started with GEO, CouchDB, and Node.js
Getting Started with GEO, CouchDB, and Node.js

Where. Whether it refers to where you have been, where you are, or where you are going, the concept of where is important. Where links data to the physical world. A shopping list can be a very useful collection of data on its own, but that data can be even more useful with more context. If you map the location of the stores needed for...

Machine Perception
Machine Perception

The field of machine perception concerns the building of machines that sense and interpret their environments. This book is about visual perception. Potential applications for such systems include tasks such as automation of industrial processes of inspection and assembly, automated medical x-ray diagnosis, vehicle guidance and...

Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)
Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)

With all the fantastic Cisco documentation available online, why does the world of UCCE need this book? UCCE is such a big topic that it would be easy to think that it is possible to try and cover absolutely everything. Unfortunately, this would turn this book into nothing more than a product reference manual that could potentially be...

Handbook of Human Factors in Web Design, Second Edition (Human Factors and Ergonomics)
Handbook of Human Factors in Web Design, Second Edition (Human Factors and Ergonomics)

Since the World Wide Web became widely available in the mid 1990s, Web-based applications have developed rapidly. The Web has come to be used by a range of people for many different purposes, including online banking, e-commerce, distance education, social networking, data sharing, collaborating on team projects, and...

Operating Systems: A Spiral Approach
Operating Systems: A Spiral Approach

We have long felt that the traditional approach to teaching about Operating Systems (OSs) was not the best approach. The purpose of this book is to support a different approach to this task. When studying any complex domain of knowledge, the order in which one learns the hierarchy of principles, laws, ideas, and concepts can make the...

Result Page: 1941 1940 1939 1938 1937 1936 1935 1934 1933 1932 1931 1930 1929 1928 1927 1926 1925 1924 1923 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy