-
Trust Building and Boundary Spanning in Cross-Border Management
Author Michael Zhang
This edited book addresses two critical issues in international management: building trust and managing boundary spanning activities between international business partners. The duel-process of internationalization of multinational corporations (MNCs), through globalisati....
Release Date 2018/03 -
Author Tsinghua University Tsinghua University Press , Dengguo Feng
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such ....
Release Date 2017/12 -
Turning Heads and Changing Minds - Transcending IT Auditor Archetypes
Author Chong Ee
Building a better rapport with your clients How IT auditors and their clients perceive each other affects the quality of their working relationships. Although most books for IT auditors acknowledge the importance of soft skills, they usually focus on technical abi....
Release Date 2013/03 -
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Author Wil Allsopp
The first guide to planning and performing a physical penetration test on your computer's securityMost IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT ....
Release Date 2009/09 -
Under Control: Governance Across the Enterprise
Author Jacob Lamm
Under Control captures decades of business governance experience from many of the leading authorities at CA, Inc. This book sets out not only to explain the essential challenges of effective business governance, but to help you build solutions for your organization ....
Release Date 2009/12 -
Author Ryan Leirvik
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are availabl....
Release Date 2022/01 -
Understanding Government Contract Law
Author Terrance M. O'Connor
A “back-to-basics” guide to government contract lawFinally! A plain-English presentation of the basic legal concepts of government contract law for professionals at any stage in their careers.Until now, anyone in the procurement field has had to trudge through....
Release Date 2007/02 -
Understanding Government Contract Law, 2nd Edition
Author Terrence M. O'Connor
This updated classic offers clear and concise explanations of the basic legal concepts of government contract law for professionals at any stage of their career. Written in straightforward language for contracting officers, contract administrators, contractors,....
Release Date 2018/11 -
Author Stanley Siegel , Chris Williams , Scott Donaldson
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and busine....
Release Date 2018/12 -
Author Leslie S. Hiraoka
He covers the anti-trust case against Microsoft; the successes of eBay, Amazon, Yahoo, and Google; road-kills along the information highway such as the forgotten eToys; as well as the Enron implosion and other corporate scandals. After tracing this amazing story he....
Release Date 2017/03 -
Unequal Protection, 2nd Edition
Author Thom Hartmann
Unequal taxes, unequal accountability for crime, unequal influence, unequal control of the media, unequal access to natural resources—corporations have gained these privileges and more by exploiting their legal status as persons. How did something so illogical ....
Release Date 2010/06 -
Author Jamie Pride
The real-world secrets to startup successUnicorn Tears is the smart entrepreneur’s guide to startups. A full 92% of startups fail in the first three years — but failure is not inevitable. Most of these companies self-sabotage, unconsciously eliminating any chance a....
Release Date 2018/01 -
Unified Communications Forensics
Author Joseph II Shaw , Nicholas Mr. Grant
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by l....
Release Date 2013/10 -
Unmanned Aerial Vehicles: Embedded Control
Author Rogelio Lozano
This book presents the basic tools required to obtain the dynamical models for aerial vehicles (in the Newtonian or Lagrangian approach). Several control laws are presented for mini-helicopters, quadrotors, mini-blimps, flapping-wing aerial vehicles, planes, etc. Fi....
Release Date 2010/03 -
Unmasking the Social Engineer: The Human Element of Security
Author Paul Ekman , Paul Kelly F. , Christopher Hadnagy
Learn to identify the social engineer by non-verbal behaviorUnmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men ....
Release Date 2014/02 -
Unsolved Problems in Mathematical Systems and Control Theory
Author Vincent D. Blondel , Alexandre Megretski
This book provides clear presentations of more than sixty important unsolved problems in mathematical systems and control theory. Each of the problems included here is proposed by a leading expert and set forth in an accessible manner. Covering a wide range of areas....
Release Date 2009/04 -
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Author David Both
Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.This book....
Release Date 2019/12 -
Author W. Curtis Preston
Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quic....
Release Date 2002/02 -
Author Becky Livingston
Web 2.0 is transforming workplace learning in many ways. This Infoline is designed to introduce you to the many Web 2.0 technologies available and give you ideas about how to implement them in your organization and will help you identify various social networking op....
Release Date 2010/01 -
Validating Your Business Continuity Plan: Ensuring your BCP actually works
Author Robert Clark
75% of companies without a business continuity plan fail within three years. Disruptive incidents can affect any organization and occur at any moment. ICT outages, cyber attacks, natural disasters, terrorist attacks, pandemics, supply chain failures and other unex....
Release Date 2015/11 -
Author Morgan Jones
Valve Amplifiers has been recognized as the most comprehensive guide to valve amplifier design, analysis, modification and maintenance. It provides a detailed presentation of the rudiments of electronics and valve design for engineers and non-experts. The source als....
Release Date 2011/10 -
Variance-Constrained Multi-Objective Stochastic Control and Filtering
Author Yuming Bo , Zidong Wang , Lifeng Ma
Unifies existing and emerging concepts concerning multi-objective control and stochastic control with engineering-oriented phenomenaEstablishes a unified theoretical framework for control and filtering problems for a class of discrete-time nonlinear stochastic syst....
Release Date 2015/06 -
VCAP5-DCD Official Cert Guide: VMware Certified Advanced Professional 5-Data Center Design
Author Paul McSharry
The Publisher regrets that the companion CD/DVD content for this title cannot be made available Online.The VCAP5-DCD Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This....
Release Date 2013/08 -
VCP-Cloud Official Cert Guide (with DVD): VMware Certified Professional - Cloud
Author Tom Ralph , Nathan Raper
The Publisher regrets that the CD/DVD content for this title cannot be made available Online.VCP-Cloud Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" qui....
Release Date 2013/10 -
VCP5-DT Official Cert Guide: VMware Certified Professional 5 - Desktop
Author Linus Bourque
The Publisher regrets that the companion CD/DVD content cannot be made available Online.The VCP5-DT Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizze....
Release Date 2013/08 -
Author Behrooz Mashadi , David Crolla
The powertrain is at the heart of vehicle design; the engine – whether it is a conventional, hybrid or electric design – provides the motive power, which is then managed and controlled through the transmission and final drive components. The overall powertra....
Release Date 2012/01 -
Verification of Systems and Circuits Using LOTOS, Petri Nets, and CCS
Author Rakefet Kol , Michael Yoeli
A Step-by-Step Guide to Verification of Digital SystemsThis practical book provides a step-by-step, interactive introduction to formal verification of systems and circuits. The book offers theoretical background and introduces the application of three powerful verif....
Release Date 2008/03 -
Version Control with Subversion, 2nd Edition
Author Brian W. Fitzpatrick , Ben Collins-Sussman , C. Michael Pilato
Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers Subversion 1.5 with a complete introduction and guided tour of its c....
Release Date 2008/09 -
VHF / UHF Filters and Multicouplers: Application of Air Resonators
Author Bernard Piette
This book describes the various devices used in radio communication and broadcasting to achieve high selectivity filtering and coupling. After providing a background in the basics of microwave theory and more detailed material - including a special chapter on precis....
Release Date 2010/02 -
Video Systems in an IT Environment
Author Al Kovalick
Audio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes te....
Release Date 2005/12