-
APM Best Practices: Realizing Application Performance Management
Author Michael J. Sydor
The objective of APM Best Practices is to establish reliable Application Performance Management practices—to demonstrate value, to do it quickly, and to adapt to the client circumstances. Balancing long-term goals with short-term deliverables, but without compromisi....
Release Date 2010/01 -
Author Becky Livingston
Web 2.0 is transforming workplace learning in many ways. This Infoline is designed to introduce you to the many Web 2.0 technologies available and give you ideas about how to implement them in your organization and will help you identify various social networking op....
Release Date 2010/01 -
Human Rights, Democracy and Governance
Author ActionAid Asia ActionAid International Asia
Human Rights, Democracy and Governance is one of the volumes of the series titled, Imagine a New South Asia, presented by ActionAid International Asia. This volume emphasizes on unity in South Asia based on liberty and fraternity. It acknowledges that the countries ....
Release Date 2010/01 -
Author Himanshu Dwivedi , Chris Clark , David Thiel
Secure today's mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how ....
Release Date 2010/02 -
Programming and Customizing the Multicore Propeller Microcontroller: The Official Guide
Author Parallax
The Only Official Guide to the Parallax Multicore Propeller MicrocontrollerWritten by a team of Propeller experts, this authoritative guide shows you how to realize your design concepts by taking full advantage of the multicore Propeller microcontroller's unique ar....
Release Date 2010/02 -
Dealing with a Lay Off: What to Expect When You Are No Longer Expected
Author Martha I. Finney
This Element is an excerpt from Rebound: A Proven Plan for Starting Over After Job Loss (ISBN: 9780137021147) by Martha Finney. Available in print and digital formats.Get your head and heart together after you’re laid off: what you’ll feel and how to handle it.You’v....
Release Date 2010/02 -
How to Control Your Finances After You Are Laid Off
Author Martha I. Finney
This Element is an excerpt from Rebound: A Proven Plan for Starting Over After Job Loss (ISBN: 9780137021147) by Martha I. Finney. Available in print and digital formats.Laid off? Get control of your money, and protect your long-term finances, without denying yours....
Release Date 2010/02 -
Outsourcing: Some Ideas about When and Why to Do It
Author Phil Baker
This Element is an excerpt from From Concept to Consumer: How to Turn Ideas Into Money (9780137137473) by Phil Baker. Available in print and digital formats. When and why to outsource—and how to manage Asian outsourcing relationships to maximize profits and minimiz....
Release Date 2010/02 -
Co-design Approaches to Dependable Networked Control Systems
Author Christophe Aubrun , Ye-Qiong Song , Daniel Simon
This book describes co-design approaches, and establishes the links between the QoC (Quality of Control) and QoS (Quality of Service) of the network and computing resources. The methods and tools described in this book take into account, at design level, various par....
Release Date 2010/02 -
VHF / UHF Filters and Multicouplers: Application of Air Resonators
Author Bernard Piette
This book describes the various devices used in radio communication and broadcasting to achieve high selectivity filtering and coupling. After providing a background in the basics of microwave theory and more detailed material - including a special chapter on precis....
Release Date 2010/02 -
The Pocket Idiot's Guide™ to the FairTax
Author Ken Clark
Keeping your job is job one.In recent years, the FairTax has gained a lot of attention, but for the vast majority of Americans, there's a sense that there's still too little unbiased information on which to make an informed decision. The Pocket Idiot's Guide™ to ....
Release Date 2010/02 -
Author John R. Vacca
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate....
Release Date 2010/02 -
Author Jason D. O’Grady
In this handy new Pocket Guide, mobile device expert Jason O'Grady reveals the secrets to using the DROID. He covers everything from how to make phone calls, send text messages and email to synching data with your Google account. In addition he covers how to surf ....
Release Date 2010/03 -
How to Use Questions to Maintain Direction and Control of the Agenda
Author Terry J. Fadem
This Element is an excerpt from The Art of Asking: Ask Better Questions, Get Better Answers (9780137144242) by Terry J. Fadem. Available in print and digital formats.Learn questioning techniques that help you control the agenda, overcome challenges, and move forward....
Release Date 2010/03 -
Photographing Yosemite: Digital Field Guide
Author Lewis Kemper
The ideal companion guide for capturing awe-inspiring photos of Yosemite!Whether using a compact camera or a high-end dSLR, this companion guide provides you with detailed information for taking spectacular shots of some of the most recognizable landmarks in the wor....
Release Date 2010/03 -
Author Tan
This book covers all the fundamental concepts of Health Management Information Systems (HMIS), provides relevant and current HMIS cases throughout, and touches on emerging technologies. Topics include: information systems from a managerial perspective; roles of cio....
Release Date 2010/03 -
Unmanned Aerial Vehicles: Embedded Control
Author Rogelio Lozano
This book presents the basic tools required to obtain the dynamical models for aerial vehicles (in the Newtonian or Lagrangian approach). Several control laws are presented for mini-helicopters, quadrotors, mini-blimps, flapping-wing aerial vehicles, planes, etc. Fi....
Release Date 2010/03 -
The Pocket Idiot's Guide™ To Surviving an Audit
Author Alan Friedfel , Rich Mintzer
An essential resource for coping with the taxing ordeal of being audited.The Pocket Idiot's Guide™ to Surviving an Audit presents all of the information a taxpayer needs to get through an audit in one piece, including:*What is an audit?*The summons*The interview*Ri....
Release Date 2010/03 -
ISO27000 and Information Security: A Combined Glossary
Author Steve G. Watkins , Alan Calder
Get to grips with key ISO27000 and information security vocabulary with this indispensable, concise pocket guide! Information security is of crucial importance to your business. If you don't know the difference between a cookie and a worm, or between war-chalking....
Release Date 2010/03 -
Digital Video Surveillance and Security
Author Anthony C. Caputo
Digital Video Surveillance & Security provides a blueprint for the IP-based electronic security system clients need, allowing security professionals to protect their client's place of business or home. The author gives detailed plans on the best camera position....
Release Date 2010/03 -
A Brief Look at Some Businesses Based on Shared Social Experience
Author Rawn Shah
This Element is an excerpt from Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs (9780132357791) by Rawn Shah. Available in print and digital formats.¿Lessons from some of today’s most innovative social businesses: last.fm, Li....
Release Date 2010/04 -
Adobe® ColdFusion® 9 Web Application Construction Kit, Volume 1: Getting Started
Author Charlie Arehart , Raymond Camden , Ben Forta
Written by the best known and most trusted name in the ColdFusion community, Ben Forta, The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time - the books that most ColdFusion developers used to learn the product. This Gett....
Release Date 2010/04 -
CEH® Certified Ethical Hacker Study Guide
Author Kimberly Graves
Prepare for the new version of CEH certification with this advanced guideOnce you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it'....
Release Date 2010/04 -
Visual Media Coding and Transmission
Author Ahmet Kondoz
This book presents the state-of-the-art in visual media coding and transmissionVisual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields ....
Release Date 2010/04 -
Securing the Borderless Network: Security for the Web 2.0 World
Author Tom Gillis
Securing the Borderless Network: Security for the Web 2.0 WorldTom GillisSecuring the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applicationsToday’s new Web 2.0, virtualization, mobility, tele....
Release Date 2010/04 -
Author Geoff Walton , Dave Parkes
In a world where computing power, ubiquity and connectivity create powerful new ways to facilitate learning, this book examines how librarians and information professionals can utilize emerging technologies to expand service and resource delivery. With contributions....
Release Date 2010/04 -
Author Kim Kerr
Workplace violence in all its forms is becoming more prevalent and pervasive every year. Workplace Violence: Planning for Prevention and Response gives a comprehensive account of the problem using a multi-faceted approach to the issues surrounding workplace violence....
Release Date 2010/05 -
Author Jeff Carlson
Quickly master all the features and functions of the iPad with this handy well-crafted pocket guide. Versatile, portable, powerful, ergonomically and functionally designed, the iPad is the perfect companion for digital media. With photos, music, movies, e-mail, and ....
Release Date 2010/05 -
A Short Overview of Social Networks and Their Uses
Author Juliette Powell
This Element is an excerpt from 33 Million People in the Room: How to Create, Influence, and Run a Successful Business with Social Networking (9780137154357) by Juliette Powell. Available in print and digital formats.Profiling the world of social networks: what you ....
Release Date 2010/05 -
Author Joy R. Butler
If you actively use the internet to advance your business and professional endeavors, you are a cyber citizen and this book is for you. As a good cyber citizen, you want to stay legal online and protect your online interests. The Cyber Citizen’s Guide Th....
Release Date 2010/05