Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

The Executive MBA for Engineers and Scientists
  • Language: en
  • Pages: 290

The Executive MBA for Engineers and Scientists

  • Type: Book
  • -
  • Published: 2009-12-01
  • -
  • Publisher: CRC Press

All too often, a simple lack of understanding of fundamental business concepts is enough to prevent capable scientists and engineers from receiving otherwise deserved promotions. These days, technical merit and hard work alone no longer guarantee upward mobility. For scientists and engineers with aspirations of moving up the corporate ladder a keen

Mobile Enterprise Transition and Management
  • Language: en
  • Pages: 322

Mobile Enterprise Transition and Management

  • Type: Book
  • -
  • Published: 2009-06-25
  • -
  • Publisher: CRC Press

Addressing the rapid evolution of global communications, this book provides step-by-step guidance on how to configure, enact, and manage the process of integrating mobile technology within an organization. The mobile enterprise transition (MET) process presented considers input from the four significant dimensions of an organization - economic, technical, process, and social - making it a well-rounded and complete process. Based on extensive research, literature review, and practical experimentation, this comprehensive text presents emerging best practices, exhaustive case studies, and examples of successful transitions. It also provides detailed references, and a glossary of key terms and commonly used acronyms.

Vulnerability Management
  • Language: en
  • Pages: 354

Vulnerability Management

  • Type: Book
  • -
  • Published: 2009-08-26
  • -
  • Publisher: CRC Press

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any organization is its capacity for quick system-wide response, current emphasis needs to be placed on maintaining the integrity of IT applications, so critical to the real and the virtual infrastructure and productivity of any community or business entity. Written by international security consultant Park Foreman, Vulnerability Management demonstrates a proactive approach. ...

Strategic Data Warehousing
  • Language: en
  • Pages: 163

Strategic Data Warehousing

  • Type: Book
  • -
  • Published: 2009-07-29
  • -
  • Publisher: CRC Press

Organization of data warehouses are vital but often ignored aspects of growing enterprises. This work merges technological know-how with managerial practices to show both the business manager and the IT professional how better alignment between data warehouse plans and business strategies can lead to a successful data warehouse adoption that will support the entire infrastructure. More complete than any other text in the field, this resource also addresses the managerial and strategic aspects of data warehouses, offering doable solutions that will allow for the strategic alignment of these warehouses while building them and ensuring that this alignment is sustained.

Information Technology Control and Audit
  • Language: en
  • Pages: 804

Information Technology Control and Audit

  • Type: Book
  • -
  • Published: 2008-11-18
  • -
  • Publisher: CRC Press

The headline-grabbing financial scandals of recent years have led to a great urgency regarding organizational governance and security. Information technology is the engine that runs modern organizations, and as such, it must be well-managed and controlled. Organizations and individuals are dependent on network environment technologies, increasing t

Product Release Planning
  • Language: en
  • Pages: 314

Product Release Planning

  • Type: Book
  • -
  • Published: 2010-06-16
  • -
  • Publisher: CRC Press

Business success hinges on successfully creating products with the right features. You must correctly analyze the needs of the customer and match these needs with your resources to not only produce a product and but also deliver it in a timely manner. An in-depth understanding of systematic release planning can put you on this path. Authored by ren

Understanding and Applying Cryptography and Data Security
  • Language: en
  • Pages: 667

Understanding and Applying Cryptography and Data Security

  • Type: Book
  • -
  • Published: 2009-04-09
  • -
  • Publisher: CRC Press

A How-to Guide for Implementing Algorithms and Protocols Addressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author’s teaching notes and research publications, the text is designed for electrical engineering and computer science courses. Provides the Foundation for Constructing Cryptographic Protocols The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encrypti...

Implementing Program Management
  • Language: en
  • Pages: 314

Implementing Program Management

  • Type: Book
  • -
  • Published: 2009-10-05
  • -
  • Publisher: CRC Press

In early 2007, the Project Management Institute (PMI) piloted the now highly sought after Program Management Professional (PgMP) credential, reflecting the growing trend for organizations to coordinate the work done on numerous stand-alone projects into a cohesive program-type structure. Written by two successful PgMPs, Implementing Program Managem

Secure Java
  • Language: en
  • Pages: 302

Secure Java

  • Type: Book
  • -
  • Published: 2010-09-14
  • -
  • Publisher: CRC Press

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and

How to Complete a Risk Assessment in 5 Days or Less
  • Language: en
  • Pages: 458

How to Complete a Risk Assessment in 5 Days or Less

  • Type: Book
  • -
  • Published: 2008-11-18
  • -
  • Publisher: CRC Press

Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation, How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists, forms, questionnaires, and sample assessments. ...