Your cart is empty
Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and maintain user accounts. Then, dive into managing authentications, certificates, audits, and traces. Highlights include: 1) SAP HANA cockpit 2) Privileges 3) Catalog objects 4) User accounts 5) Roles 6) Authentication 7) Certificate management 8) Encryption 9) Lifecycle management 10) Auditing 11) Security tracing.
If you're performing a brownfield migration from an existing SAP ERP system, this is the technical guide for you! From planning the project and preparing your system to adjusting custom code and executing the conversion, you'll get step-by-step instructions for all stages of your implementation. Troubleshooting tips and extensive coverage of the functional conversion will help you ensure that all your data makes it to where it needs to be. The time to move to SAP S/4HANA is here. Plan and prepare for the migration from SAP ERP to SAP S/4HANA. Walk through the complete technical conversion process and adapt custom code and business functions for SAP S/4HANA. Learn about essential functional conversion steps for finance, logistics, and more.
Whether you know it as plant maintenance or asset management, this is the only guide you need to set it up in SAP S/4HANA! Start by planning your plant maintenance implementation, and then jump into configuring the organizational structure and system-wide functions. Use step-by-step instructions to set up your technical systems, from your equipment and fleet to your materials and assemblies. If you're looking to configure breakdown maintenance, corrective maintenance, preventive maintenance, predictive maintenance, or all four, this is the book for you! Highlights include: 1) Organizational structure 3) Work ordee 4) Equipment management 5) Preventive maintenancee 6) Predictive maintenancee 7) Breakdown maintenance 8) Corrective maintenancee 9) SAP Fiori launchpade 10) Project plae
Master SAP ILM, from retention management to lifecycle management for custom code. Follow step-by-step instructions and walk through all major functionality including policy creation, legal case management, data archiving, and more. Whether you're on SAP S/4HANA, SAP S/4HANA Cloud, or SAP ERP, you'll find the details you need to configure and use SAP ILM. Control and protect your data! Manage live and archived data with SAP Information Lifecycle Management Define data management policies and block, delete, and archive data Prepare for system decommissioning, implement a GDPR project, and more
Learn to use Excel dashboards and reports to better conceptualize data
Updated for all the?latest features and capabilities of Excel 2013, this go-to resource provides you with in-depth coverage of the individual functions and tools that can be used to create?compelling Excel reports. Veteran author Michael Alexander walks you through the most effective ways to present and report data. Featuring a comprehensive review of a wide array of technical and analytical concepts, this essential guide helps you go from reporting data with simple tables full of dull numbers to presenting key information through the use of high-impact, meaningful reports and dashboards that will wow management both visually and substantively.Details how to analyze large amounts of data and report the results in a way that is both visually attractive and effectiveDescribes how to use different perspectives to achieve better visibility into data, as well as how to slice data into various views on the flyShows how to automate redundant reporting and analysis processesWalks you through creating impressive dashboards, eye-catching visualizations, and real-world What-If analyses
"Excel Dashboards and Reports, Second Edition" is part technical manual, part analytical guidebook, and exactly what you need to become your organization's dashboard?dynamo
Written using clear and accessible language, this text provides detailed coverage of the core mathematical concepts underpinning signal processing. All the core areas of mathematics are covered, including generalized inverses, singular value decomposition, function representation, and optimization, with detailed explanations of how basic concepts in these areas underpin the methods used to perform signal processing tasks. A particular emphasis is placed on the practical applications of signal processing, with numerous in-text practice questions and real-world examples illustrating key concepts, and MATLAB programs with accompanying graphical representations providing all the necessary computational background. This is an ideal text for graduate students taking courses in signal processing and mathematical methods, or those who want to establish a firm foundation in these areas before progressing to more advanced study.
Metaheuristics exhibit desirable properties like simplicity, easy parallelizability and ready applicability to different types of optimization problems such as real parameter optimization, combinatorial optimization and mixed integer optimization. They are thus beginning to play a key role in different industrially important process engineering applications, among them the synthesis of heat and mass exchange equipment, synthesis of distillation columns and static and dynamic optimization of chemical and bioreactors.
This book explains cutting-edge research techniques in related computational intelligence domains and their applications in real-world process engineering. It will be of interest to industrial practitioners and research academics.
Electronic mail, personal organizers, voice mail, all were introduced as time-saving devices designed to promote an easier and more efficient workplace. Yet many professionals find that making effective use of these new forms of communication technology can become a time-consuming task. In this handbook written for the office of the 21st century, Barbara Etzel and Peter J. Thomas provide guidance for those struggling to manage the growing volume of mail, memos, e-mail messages, and electronic documents that arrives daily.
Personal Information Management details the skills professionals need to process this information, save time, and work more effectively. Etzel and Thomas present common organizational difficulties and enumerate concrete techniques for overcoming them. They guide the reader through a variety of computer software and hardware products, paper-based information products, and personal time management techniques, helping the reader to develop and individually-tailored Personal Information Management Strategy.
Technologies covered include accounting and business software, word processors, databases, personal organizers, e-mail programs, tracking and storage packages, personal digital assistants, CD-Roms, computer backup devices, scanning device, voice mail, cellular phones, beepers, and fax machines, to name only a few. including an appendix listing the names and addresses of companies that Produce information technologies, Personal Information Technologies is essential reading for anyone suffering from information overload. Designed to be adaptable to emerging technologies, the techniques they provide will be applicable regardless for what the information age brings next.
From acclaimed Financial Times columnist and CNN analyst Rana Foroohar, comes this penetrating indictment of how today's biggest tech companies are hijacking our data, our livelihoods, and our minds.
Today Google and Facebook receive 90% of the world's news ad-spending. Amazon takes half of all e-commerce in the US. Google and Apple operating systems run on all but 1% of cell phones globally. And 80% of corporate wealth is now held by 10% of companies - not the GEs and Toyotas of this world, but the digital titans. How did we get here? How did the tech industry get to dominate our world so completely? How did once-idealistic and innovative companies come to manipulate elections, violate our privacy, and pose a threat to the fabric of our democracy? In Don't Be Evil, Financial Times global business columnist Rana Foroohar documents how Big Tech lost its soul - and became the new Wall Street.
Through her skilled reporting and unparalleled access - won through nearly 30 years covering business and technology - she shows the true extent to which the 'Faang's (Facebook, Apple, Amazon, Netflix and Google) crush or absorb any potential competitors, hijack our personal data and mental space and offshore their exorbitant profits. What's more, she reveals how these threats to our democracies, our livelihoods and our minds are all intertwined. Yet Foroohar also lays out a plan for how we can resist, creating a framework that fosters innovation while also protecting us from the dark side of digital technology.
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural templates and styles, their formalization, validation and testing and finally the engineering approach in which these consistent and autonomous elements can be tackled.
Secure your CSSP certification CCSP is the world's leading Cloud Security certification. It covers the advanced technical skills and knowledge to design, manage, and secure data, applications, and infrastructure in the cloud using best practices, policies, and procedures. If you're a cloud security professional seeking your CSSP certification, this book is a perfect way to prepare for the exam. Covering in detail all six domains, the expert advice in this book gives you key information you'll need to pass the exam. In addition to the information covered on the exam, you'll get tips on setting up a study plan, tips for exam day, and access to an online test bank of questions. Key information for all six exam domains Test -taking and exam day tips and tricks Free online practice questions and flashcards Coverage of the core concepts From getting familiar with the core concepts to establishing a study plan, this book is all you need to hang your hat on that certification!
Computational cell biology courses are increasingly obligatory for biology students around the world but of course also a must for mathematics and informatics students specializing in bioinformatics. This book, now in its second edition is geared towards both audiences. The author, Volkhard Helms, has, in addition to extensive teaching experience, a strong background in biology and informatics and knows exactly what the key points are in making the book accessible for students while still conveying in depth knowledge of the subject. Besides a greatly increased focus on RNA biology and epigenetics, new topics such as intracellular trafficking, particle tracking, and more cellular programs e.g. circadian rhythms, apoptosis and cell differentiation, have been included. In addition, the book features supplementary material on the web including slides for presentations.
As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
The Internet of Things(IoT) is an often-cited topic among researchers and practitioners. This essential book explains the concept and potential that the IoT presents, from mobile applications that allow home appliances to be programmed remotely, to solutions in manufacturing and energy conservation. Coverage features a tutorial for implementing the IoT using IPv6 and Mobile IPv6 and answers critical questions such as what is the IoT, how can it help my organization, what is the cost of deploying this system, and what are the security issues?
Business Research Methods will show your students how to undertake all parts of their research through this clear structured guide. Christina Quinlan's qualitative and holistic approaches are combined with William Zikmund's quantitative and advanced methods to give your students a broad spectrum of approaches for their research project. It is a comprehensive and interesting text that is essential reading for any business student taking a research methods module. Each stage of the research process is considered, including ethics and philosophical frameworks.
This classic book on formal languages, automata theory, and computational complexity has been updated to present theoretical concepts in a concise and straightforward manner with the increase of hands-on, practical applications. This new edition comes with Gradiance, an online assessment tool developed for computer science. Please note, Gradiance is no longer available with this book, as we no longer support this product.
How the history of technological revolutions can help us better understand economic and political polarization in the age of automation From the Industrial Revolution to the age of artificial intelligence, The Technology Trap takes a sweeping look at the history of technological progress and how it has radically shifted the distribution of economic and political power among society's members. As Carl Benedikt Frey shows, the Industrial Revolution created unprecedented wealth and prosperity over the long run, but the immediate consequences of mechanization were devastating for large swaths of the population. Middle-income jobs withered, wages stagnated, the labor share of income fell, profits surged, and economic inequality skyrocketed. These trends, Frey documents, broadly mirror those in our current age of automation, which began with the Computer Revolution. Just as the Industrial Revolution eventually brought about extraordinary benefits for society, artificial intelligence systems have the potential to do the same. But Frey argues that this depends on how the short term is managed. In the nineteenth century, workers violently expressed their concerns over machines taking their jobs. The Luddite uprisings joined a long wave of machinery riots that swept across Europe and China. Today's despairing middle class has not resorted to physical force, but their frustration has led to rising populism and the increasing fragmentation of society. As middle-class jobs continue to come under pressure, there's no assurance that positive attitudes to technology will persist. The Industrial Revolution was a defining moment in history, but few grasped its enormous consequences at the time. The Technology Trap demonstrates that in the midst of another technological revolution, the lessons of the past can help us to more effectively face the present.
Praised by instructors for its concise, focused approach and user-friendly format, the Illustrated Series engages both computer rookies and hot shots in mastering MICROSOFT OFFICE 2013 applications quickly and efficiently. Skills are accessible and easy-to-follow thanks to the Illustrated Series' hallmark 2-page layout, which allows students to see an entire task in one view. New Learning Outcomes outline the skills covered in each lesson, and larger full-color screens represent exactly what students should see on their own computers. Each unit begins with a brief overview of the principles of the lesson, and introduces a case study for further application.
How can you establish a customer-centric culture in an organization? This is the first comprehensive book on how to actually do service design to improve the quality and the interaction between service providers and customers. You'll learn specific facilitation guidelines on how to run workshops, perform all of the main service design methods, implement concepts in reality, and embed service design successfully in an organization. Great customer experience needs a common language across disciplines to break down silos within an organization. This book provides a consistent model for accomplishing this and offers hands-on descriptions of every single step, tool, and method used.You'll be able to focus on your customers and iteratively improve their experience. Move from theory to practice and build sustainable business success.
A new edition of the #1 text in the human computer Interaction field! Hugely popular with students and professionals alike, the Fifth Edition of Interaction Design is an ideal resource for learning the interdisciplinary skills needed for interaction design, human-computer interaction, information design, web design, and ubiquitous computing. New to the fifth edition: a chapter on data at scale, which covers developments in the emerging fields of 'human data interaction' and data analytics. The chapter demonstrates the many ways organizations manipulate, analyze, and act upon the masses of data being collected with regards to human digital and physical behaviors, the environment, and society at large. Revised and updated throughout, this edition offers a cross-disciplinary, practical, and process-oriented, state-of-the-art introduction to the field, showing not just what principles ought to apply to interaction design, but crucially how they can be applied. Explains how to use design and evaluation techniques for developing successful interactive technologies Demonstrates, through many examples, the cognitive, social and affective issues that underpin the design of these technologies Provides thought-provoking design dilemmas and interviews with expert designers and researchers Uses a strong pedagogical format to foster understanding and enjoyment An accompanying website contains extensive additional teaching and learning material including slides for each chapter, comments on chapter activities, and a number of in-depth case studies written by researchers and designers.
This book explores recursive architectures in designing progressive hyperspectral imaging algorithms. In particular, it makes progressive imaging algorithms recursive by introducing the concept of Kalman filtering in algorithm design so that hyperspectral imagery can be processed not only progressively sample by sample or band by band but also recursively via recursive equations. This book can be considered a companion book of author's books, Real-Time Progressive Hyperspectral Image Processing, published by Springer in 2016.
In this original novel based on the hit video game XCOM 2, the Resistance gains new allies in fighting a new powerful alien enemy force. Under constant threat by the alien occupation, humanity's fate is in the hands of the last remaining hope for the people of Earth: XCOM. XCOM 2: ESCALATION follows XCOM as they continue to fight for freedom, redemption, and survival. Fans of the critically acclaimed video game franchise will enjoy this exciting addition to the XCOM story and its use of elements of the popular game.
The latest on SQL databases SQL All -In-One For Dummies, 3rd Edition, is a one-stop shop for everything you need to know about SQL and SQL-based relational databases. Everyone from database administrators to application programmers and the people who manage them will find clear, concise explanations of the SQL language and its many powerful applications. With the ballooning amount of data out there, more and more businesses, large and small, are moving from spreadsheets to SQL databases like Access, Microsoft SQL Server, Oracle databases, MySQL, and PostgreSQL. This compendium of information covers designing, developing, and maintaining these databases. Cope with any issue that arises in SQL database creation and management Get current on the newest SQL updates and capabilities Reference information on querying SQL-based databases in the SQL language Understand relational databases and their importance to today's organizations SQL All-In-One For Dummies is a timely update to the popular reference for readers who want detailed information about SQL databases and queries.
You may like...
MIS 8 - with MIS Online, 1 term (6…
Hossein Bidgoli Paperback (1)
Gary Schneider Paperback
Systems Analysis and Design
Scott Tilley, Harry J. Rosenblatt Hardcover
Database Principles - Fundamentals of…
Carlos Coronel, Stephen Morris, … Paperback
Principles Of Business Information…
Ralph Stair, George Reynolds, … Paperback (3)
Systems Analysis and Design in a…
John W. Satzinger, Robert Jackson, … Hardcover (1)
Sasha Vodnik, Don Gosselin Paperback (1)
These Things Really Do Happen To Me
Khaya Dlanga Paperback (1)
Data Structures Using C++
D. Malik Paperback
Oracle 12c - SQL
Joan Casteel Paperback (1)