Dimensional Modeling: In a Business Intelligence Environment Customers Also Bought

Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
2012
The State of Risk-Based Security Management The State of Risk-Based Security Management
2012
Enterprise Data Warehouse Optimization with Hadoop on IBM Power Systems Servers Enterprise Data Warehouse Optimization with Hadoop on IBM Power Systems Servers
2018
Security of Networks and Services in an All-Connected World Security of Networks and Services in an All-Connected World
2017
IPv6 is Easy IPv6 is Easy
2013
One Database, Many Instances: How to Have the Best of Both Worlds By Integrating SQL and NoSQL One Database, Many Instances: How to Have the Best of Both Worlds By Integrating SQL and NoSQL
2011
The Myth of the Secure OS The Myth of the Secure OS
2012
Security Vs. Convenience Security Vs. Convenience
2012
AI and Big Data on IBM Power Systems Servers AI and Big Data on IBM Power Systems Servers
2019
IBM Optim Performance Manager for DB2 for Linux, UNIX, and Windows IBM Optim Performance Manager for DB2 for Linux, UNIX, and Windows
2011
Network Centric Warfare Network Centric Warfare
1999
Advanced Data Warehousing Advanced Data Warehousing
2013
IBM PowerVM Virtualization Introduction and Configuration IBM PowerVM Virtualization Introduction and Configuration
2017
Protecting Virtual Datacenters Protecting Virtual Datacenters
2012
Cloud Security Starter Kit – Overview Cloud Security Starter Kit – Overview
2011