W książce zawarto opis badań różnych aspektów twórczości i recepcji dzieł Szekspira na świecie i w Polsce. Jako wynik samodzielnych dociekań są one...
The WWW era made billions of people dramatically dependent on the progress of data technologies, out of which Internet search and Big Data are...
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during...
Archives and the Computer deals with the use of the computer and its systems and programs in archiving data and other related materials. The book...
Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide...
Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The...
"What information do these data reveal?" "Is the information correct?" "How can I make the best use of the information?" The widespread use of...
Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash...
Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood...
Data mapping in a data warehouse is the process of creating a link between two distinct data models’ (source and target) tables/attributes. Data...