-
Social Capital, Social Identities
Author Hans Bernhard Schmid , Christoph Henning , Dieter Thomä
Current research on social capital tends to focus on an economic reading of social relations. Whereas economists pride themselves on reaching out to social theory at-large, sociologists criticize the economization of the social fabric. The concept of social capital....
Release Date 2014/08 -
SOA Governance: Governing Shared Services On-Premise and in the Cloud
Author Filippos Santas , Chris Venable , Andre Tost , Leo Shuster , Robert Schneider , Rober
“Accenture sees this book as a milestone that will support the rationale behind selling and delivering SOA governance projects around the world.”--Dr. Matthias Ziegler, Accenture / Dr. Jure Zakotnik, Accenture / Thomas M. Michelbach, Accenture“We are using this book....
Release Date 2011/04 -
SOA Governance in Action: REST and Web Service Architectures
Author Jos Dirksen
SummarySOA Governance in Action is a hands-on guide for developers and technology leads who need to develop and implement policies for SOA projects. This book introduces the fundamentals of good governance, the best practices for implementing them, and how to suppor....
Release Date 2012/07 -
Author Tilak Mitra , Clive Gee , Robert G. Laird , William A. Brown
Address the #1 Success Factor in SOA Implementations: Effective, Business-Driven GovernanceInadequate governance might be the most widespread root cause of SOA failure. In SOA Governance, a team of IBM’s leading SOA governance experts share hard-won best practices f....
Release Date 2008/12 -
Sniffer Pro Network Optimization & Troubleshooting Handbook
Author Syngress
Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Networ....
Release Date 2002/08 -
Author Robert Morgan , Jean-Louis Bravard
A focused, implementation-orientated, executive-level book on outsourcing by two globally known practitioners.The outsourcing market is booming, the total outsourcing market in EMA forecasts a $59 billion dollar growth between 2004 and 2007.Fills a fills a major gap....
Release Date 2009/01 -
Sliding Mode Control of Uncertain Parameter-Switching Hybrid Systems
Author Xiaojie Su , Peng Shi , Ligang Wu
In control theory, sliding mode control (SMC) is a nonlinear control method that alters the dynamics of a nonlinear system by application of a discontinuous control signal that forces the system to slide along a cross-section of the system's normal behaviour. In re....
Release Date 2014/07 -
Simple Steps to Data Encryption
Author Peter Loshin
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to b....
Release Date 2013/04 -
Signals and Systems For Dummies
Author Mark Wickert , PhD
Getting mixed signals in your signals and systems course?The concepts covered in a typical signals and systems course are often considered by engineering students to be some of the most difficult to master. Thankfully, Signals & Systems For Dummies is your intui....
Release Date 2013/06 -
SHRM-CP/SHRM-SCP Certification All-in-One Exam Guide
Author William D. Kelly , William H. Truesdell , Dory Willer
Take the SHRM-Certified Professional (SHRM-CP) and SHRM-Senior Certified Professional (SHRM-SCP) exams with complete confidenceThis integrated exam preparation system delivers 100% coverage of all topics for both the SHRM-Certified Professional (SHRM-CP) and SHRM-S....
Release Date 2018/12 -
Author Gregory J. Skulmoski
The demand for cybersecurity expertise is growing phenomenally; enhancing cybersecurity project skills will boost technology professionals’ careers and improve organizational cybersecurity readiness.Shields Up: Cybersecurity Project Management provides an end-to-end framework tuned for cybersecurity....
Release Date 2022/08 -
Shared Memory Application Programming
Author Victor Alessandrini
Shared Memory Application Programming presents the key concepts and applications of parallel programming, in an accessible and engaging style applicable to developers across many domains. Multithreaded programming is today a core technology, at the basis of all sof....
Release Date 2015/11 -
Seven Deadliest Network Attacks
Author Mike Borkin , Rob Kraus , Stacy Prowell
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and ....
Release Date 2010/06 -
Service Integration and Management (SIAM™) Professional Body of Knowledge (BoK), Second edition
Service Integration and Management (SIAM™) Professional Body of Knowledge (BoK), Second edition has been updated to reflect changes to the market and is the official guide for the EXIN SIAM™ Professional certification.Prepare for your SIAM™ Professional exam and understand how SIAM can benefit your .... -
Service Integration and Management (SIAM™) Foundation Body of Knowledge (BoK), Second edition
Service Integration and Management (SIAM™) Foundation Body of Knowledge (BoK), Second edition has been updated to reflect changes to the market and is the official guide for the EXIN SIAM™ Foundation certification.Prepare for your SIAM™ Foundation exam and understand how SIAM can benefit your organi.... -
Service Desk and Incident Manager: Careers in IT service management
Author Peter Wheatcroft
The role of a service desk manager is to provide the single point of contact between an IT organisation and its users. Responsibilities include developing, implementing, monitoring and improving processes and procedures relating to the management of incidents and se....
Release Date 2014/07 -
Author Jean-Philippe Aumasson
"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, bl....
Release Date 2017/11 -
Author Lloyd Kaufman
This is the 3rd volume in Mr. Kaufman's hilarious, how-to series for hard-working self-starters and hard-laughing, cheeky filmmakers. "Sell Your Own Damn Movie!" covers everything you need to do to get your finished film seen by festival-goers, movie-goers, DVD-buy....
Release Date 2012/09 -
Selecting the Right NAP Architecture
Author Microsoft , Inc.
The objective of this guide is to provide a consistent structure for addressing the decisions and activities most critical to the successful implementation of the Microsoft® Network Access Protection (NAP) infrastructure. This guide includes several specific questio....
Release Date 2008/05 -
Author Barry Oshry
In this extensively revised and updated edition of his classic book, Barry Oshry shows how we can transform “system blindness” into “system sight,” enabling us to live and work together in productive partnership. Based on more than thirty years of research and ....
Release Date 2007/08 -
Author Paul Kearney
Deploy information security across the businessKnowing about information security is not enough. You also have to deploy it across the business - which means convincing management of its importance. Learn how with this essential guide!Information technology plays a ....
Release Date 2010/12 -
Author James M. Stewart
Get the streamlined tool you need to bone up for the Security+ exam [SYO-101]. Fast Pass coverage includes:General security concepts.Assessing risk.Securing communications.Implementing wireless security features.Configuring a firewall.Detecting intrusions.Securing y....
Release Date 2004/10 -
Author Mike Chapple
Ace the CompTIA Security+ exam with over 700 practice exam questions written using the style and format of the Security+ examKey FeaturesGet a detailed breakdown of the type of questions and the exam environmentDiscover a step-by-step process that guides you throug....
Release Date 2019/10 -
Security+ Practice Questions Exam Cram 2 (Exam SYO-101)
Author Hans B. Sparbel
The Security+ exam certifies that candidates have demonstrated the aptitude and ability to master general security concepts, communications security, infrastructure security, basics of cryptography, and operation/organizational security. Security+ is taught at Excel....
Release Date 2004/03 -
Author Anton Chuvakin , Cyrus Peikari
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find ou....
Release Date 2004/01 -
Security Strategies in Windows Platforms and Applications
Author Michael G. Solomon
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! More than 90 percent of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks aga....
Release Date 2010/11 -
Security Strategies in Web Applications and Social Networking
Author Mike Harwood
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Web Applications and Social Networking provides a unique, in-depth look at how to secure mobile users as customer-facing information migrates fro....
Release Date 2010/10 -
Security Program and Policies: Principles and Practices, Second Edition
Author Sari Greene
Everything you need to know about information security programs and policies, in one bookClearly explains all facets of InfoSec program and policy planning, development, deployment, and managementThoroughly updated for today’s challenges, laws, regulations, and best....
Release Date 2014/03 -
Security Policies and Implementation Issues, 3rd Edition
Author Robert Johnson , Chuck Easttom
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIESSecurity Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational ....
Release Date 2020/10