Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (13)
  • 2013  (13)
  • [Erscheinungsort nicht ermittelbar] : Auerbach Publications
Datasource
Material
Language
Years
  • 2010-2014  (13)
Year
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications
    ISBN: 9781466565791 , 1466565799 , 9781299709270 , 1299709273 , 9780429099854 , 0429099851
    Language: English
    Pages: 1 online resource (xxi, 268 pages)
    Parallel Title: Erscheint auch als
    Keywords: Business intelligence ; Business planning ; Decision making Statistical methods ; Data mining ; Management Statistical methods ; BUSINESS & ECONOMICS ; Corporate Governance ; BUSINESS & ECONOMICS ; Leadership ; BUSINESS & ECONOMICS ; Organizational Development ; BUSINESS & ECONOMICS ; Workplace Culture ; Business intelligence ; Business planning ; Data mining ; Decision making ; Statistical methods ; Management ; Statistical methods ; Electronic books
    Abstract: ""The chapters in this volume offer useful case studies, technical roadmaps, lessons learned, and a few prescriptions to 'do this, avoid that.'""--The Foreword by Joe LaCugna, Ph. D., Enterprise Analytics and Business Intelligence, Starbucks Coffee CompanyWith the growing barrage of ""big data, "" it becomes vitally important for organizations to make sense of this data and information in a timely and effective way. That's where analytics come into play. Research shows that organizations that use business analytics to guide their decision making are more productive and experien
    Note: Includes bibliographical references and index. - Print version record , English.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (487 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Although today’s job market requires IT professionals to understand cloud computing theories and have hands-on skills for developing real-world database systems, there are few books available that integrate coverage of both. Filling this void, Cloud Database Development and Management explains how readers can take advantage of the cloud environment to develop their own fully functioning database systems without any additional investment in IT infrastructure. Filled with step-by-step instructions, examples, and hands-on projects, the book begins by providing readers with the required foundation in database systems and cloud-based database development tools. It supplies detailed instructions on setting up data storage on Windows Azure and also explains how readers can develop their own virtual machines with Windows Server 2012 as the guest operating system. The book’s wide-ranging coverage includes database design, database implementation, database deployment to the cloud environment, SQL Database, Table Storage service, Blob Storage service, Queue Storage service, and database application development. The text deals with all three aspects of database design: conceptual design, logical design, and physical design. It introduces the SQL language, explains how to use SQL to create database objects, and introduces the migration of the database between Windows Azure and the on-premises SQL Server. It also discusses the management tasks that keep both SQL Database and Windows Azure running smoothly. Detailing how to design, implement, and manage database systems in the cloud, the book provides you with tools that can make your cloud database development much more efficient and flexible. Its easy-to-follow instructions will help you develop the hands-on skills needed to store and manage critical business information and to make that data available anytime through the Internet.
    Note: Online resource; Title from title page (viewed July 26, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (741 pages)
    Edition: 3rd edition
    Keywords: Electronic books ; local
    Abstract: This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight, control, and support. Illustrating the implications of project management in today's organizations, The Complete Project Management Office Handbook, Third Edition explains h
    Note: Online resource; Title from title page (viewed September 5, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (384 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The world is undergoing major transitions due to three driving forces—population changes, climate changes, and energy resource constraints—making it essential for us to move toward sustainability in the implementation of projects and programs as well as our everyday life. Real sustainability exists where there is a balance between population and energy usage and a stable climate—global equilibrium. Designed for program and portfolio managers and senior planners, Sustainable Program Management provides essential information on the three major driving forces of the coming decades and presents options to assist us in moving toward a sustainable future. This book offers a unique approach to accommodating the three new constraints of population change, climate change, and energy resources as impacts on programs and portfolios. It presents them in the form of overlays, which facilitate planning by considering the effects of these additional constraints on a program, along with schedule, budget, and performance constraints. The overlays summarize the book’s extensive analyses of these global challenges. The book is divided into sections on population change, climate change, and energy resource constraints and provides background information and overlays for each one. The author discusses scenarios, possible solutions, and probable outcomes, which provide the basis for evaluating the risks and the sustainability considerations involved. The final section of the text addresses planning for real sustainability and describes six pathways toward a sustainable system. This practical book familiarizes readers with these new global challenges to program management and provides a basis for developing sustainable and successful programs.
    Note: Online resource; Title from title page (viewed October 7, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (244 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people.Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and
    Note: Online resource; Title from title page (viewed December 9, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (266 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes. Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book’s comprehensive coverage includes: Infrastructure security model components Systems security categorization Business impact analysis Risk management and mitigation Security configuration management Contingency planning Physical security The certification and accreditation process Facilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention.
    Note: Online resource; Title from title page (viewed July 29, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    ISBN: 9781466571273
    Language: English
    Pages: 1 online resource (800 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Projec
    Note: Online resource; Title from title page (viewed August 20, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (303 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: PhoneGap is a standards-based, open-source development framework that can be deployed to any mobile device without losing the features of the native app—allowing for access to device contacts, the local file system, camera, and media on multiple platforms without requiring users to write a single line of code. Ideal for intermediate to advanced users, PhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud offers the comprehensive coverage you need to harness the power of this dynamic tool. It provides complete coverage of the cloud computing platform and the theories behind cloud computing, using a series of engaging examples. The book explains the differences between existing mobile platforms, the different types of browsers they support, and the programming languages and integrated development environment required to develop apps for each of them. It then describes how PhoneGap makes the task of developing cross-platform mobile apps easier. This book will teach you how to use: HTML5, CSS3, and JavaScript to develop apps for devices across various mobile operating systems PhoneGap Build to develop mobile apps in the cloud PhoneGap with Sencha Touch and jQuery Mobile Back end databases to store and retrieve information The text starts with simpler applications and gradually moves toward describing advanced concepts and how to exploit different application programming interfaces and methods. By the time you finish the book, you will learn how to develop feature-rich mobile applications that can run on the cloud to support different platforms. Supplying authoritative guidance and proven best practices for designing cloud-based applications, the book is an ideal reference for cloud system developers, architects, and IT professionals. It is also suitable for use in instructional settings.
    Note: Online resource; Title from title page (viewed November 21, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (246 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Complexity theory is a great, untapped resource in the field of management. Experts agree that it can be a powerful tool for managing complex and virtual programs, but there is little material available to guide program managers on how to use complexity theory to communicate and lead effectively.Filling this void, Successful Program Management: Com
    Note: Online resource; Title from title page (viewed October 21, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (261 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
    Note: Online resource; Title from title page (viewed November 19, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (438 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals w
    Note: Online resource; Title from title page (viewed October 16, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (730 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies. Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds. Reviewing recent developments in cloud computing, the book illustrates the essential concepts, issues, and challenges in developing and securing today's cloud computing platforms and applications. It also examines prototypes built on experimental cloud computing systems that the author and her team have developed at the University of Texas at Dallas. This diverse reference is suitable for those in industry, government, and academia. Technologists will develop the understanding required to select the appropriate tools for particular cloud applications. Developers will discover alternative designs for cloud development, and managers will understand if it's best to build their own clouds or contract them out.
    Note: Online resource; Title from title page (viewed October 28, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9781466581005 , 146658100X
    Language: English
    Pages: 1 online resource (298 pages , 29 illustrations).
    Edition: 1st.
    Series Statement: Infosys Press
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...