IT eBooks
Download, Read, Use
Understanding Context
Understanding Context

To make sense of the world, we're always trying to place things in context, whether our environment is physical, cultural, or something else altogether. Now that we live among digital, always-networked products, apps, and places, context is more complicated than ever-starting with "where" and "who" we are. This practical, insightful book provides a powerful toolset to help information architects, UX professionals, and web and app designers understand and solve the many challenges of contextual ambiguity in the products and services they create. You'll discover not only how to design for a given context, but also how design participates in making context. ...
Practical SharePoint 2010 Information Architecture
Practical SharePoint 2010 Information Architecture

Practical SharePoint 2010 Information Architecture is a guide and tool set for planning and documenting the scope, navigational taxonomy, document taxonomy, metadata, page layouts and workflows for a successful SharePoint 2010 project. If you have been tasked with delivering an intranet for collaboration, document management or as a corporate portal, your only chance for success is to get all of these elements right, and then to make sure that you and your stakeholders are all on the same page. ...
The InfoSec Handbook
The InfoSec Handbook

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. ...
Learning Geospatial Analysis with Python, 2nd Edition
Learning Geospatial Analysis with Python, 2nd Edition

Geospatial Analysis is used in almost every field you can think of from medicine, to defense, to farming. This book will guide you gently into this exciting and complex field. It walks you through the building blocks of geospatial analysis and how to apply them to influence decision making using the latest Python software. Learning Geospatial Analysis with Python, 2nd Edition uses the expressive and powerful Python 3 programming language to guide you through geographic information systems, remote sensing, topography, and more, while providing a framework for you to approach geospatial analysis effectively, but on your own terms. We start by giving you a little background on the field, and a survey of the techniques and technology used. We then split the field into its component specialty areas: GIS, remote sensing, elevation data, advanced modeling, and real-time data. ...
Information Security The Complete Reference, 2nd Edition
Information Security The Complete Reference, 2nd Edition

Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, 2nd Edition is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional. Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You'll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure applicat ...
Advances in Security of Information and Communication Networks
Advances in Security of Information and Communication Networks

This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications. ...
Managing Risk and Information Security
Managing Risk and Information Security

Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies - such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. ...
Information Architecture, 4th Edition
Information Architecture, 4th Edition

Scheduled for release in mid-2015, the fourth edition of this bestselling guide focuses on information architecture as a set of tools and techniques for dealing with today's tough information organization problems. It's ideal for anyone involved in any aspect of design. The universal and timeless principles of information organization described in the book's first three editions still apply in our increasingly mobile world. In the fourth edition, the authors cast those principles in the context of current practice, using many updated examples and illustrations. They examine technology- and vendor-independent tools and techniques that have also stood the test of time, and have updated the book's appendix to include the most useful information architecture resources available today. Reserve your copy of Information Architecture, 4th Edition and learn how well-planned information architecture is more essential than ever. ...
Getting an Information Security Job For Dummies
Getting an Information Security Job For Dummies

Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information Security Job For Dummies provides no-nonsense guidance on everything you need to get ahead of the competition and launch yourself into your dream job as an Information Security (IS) guru. Inside, you'll discover the fascinating history, projected future, and current applications/issues in the IS field. Next, you'll get up to speed on the general educational concepts you'll be exposed to while earning your analyst certification and the technical requirements for obtaining an IS position. Finally, learn how to set yourself up for job hunting success with trusted and supportive guidance on creating a winning resume, gaining attention with your cover letter, following up after an initial interview, ...
Healthcare Information Technology Exam Guide, 2nd Edition
Healthcare Information Technology Exam Guide, 2nd Edition

Gain the skills and knowledge required to implement and support healthcare IT (HIT) systems in various clinical and healthcare business settings. Health Information Technology Exam Guide for CHTS and CAHIMS Certifications prepares IT professionals to transition into HIT with coverage of topics ranging from health data standards to project management. This new edition includes broadened security content in addition to coverage of disruptive innovations such as complex platforms that support big data, genomics, telemedicine, mobile devices, and consumers. Learn about achieving true interoperability, updates to HIPAA rules, and FHIR and SMART standards. Healthcare and Information Technology in the United States; Fundamentals of Healthcare Information Science; Healthcare Information Standards and Regulation; Implementing, Managing, and Maintaining Healthcare Information Technology; Optimizing Healthcare Information Technology; Making Healthcare Information Technology Private, Secure, an ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2024