- Presentations
- Documents
- Infographics
What's the difference between an Active, Current or Expired security clearance?
ClearedJobs.Net
•
13 years ago
IT Portfolio Management Using Enterprise Architecture and ITIL® Service Strategy
NUS-ISS
•
11 years ago
AdvisoryOverview-Summary
John A. Bova
•
7 years ago
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Bob Rhubart
•
12 years ago
Network security - Defense in Depth
Dilum Bandara
•
8 years ago
Amazon Business Model
Vladimir Matovic
•
13 years ago
Case amazon
THAO BUI
•
7 years ago
What is Cloud Computing with Amazon Web Services?
Amazon Web Services
•
9 years ago
Introduction to Amazon Web Services
Amazon Web Services
•
13 years ago
AWS Summit London 2016 Keynote
Amazon Web Services
•
7 years ago
AWS May 2016 Webinar Series - AWS Services Overview
Amazon Web Services
•
7 years ago
Brand Management Study of Amazon
Nikhil Narayan
•
12 years ago
IT Service Delivery Model Overview
Mark Peacock
•
14 years ago
Defining Services for a Service Catalog
Axios Systems
•
12 years ago
IT and Business Service Catalogs
ITSM Academy, Inc.
•
12 years ago
Who Is Tableau Software For?
Elissa Fink
•
14 years ago
Python business intelligence (PyData 2012 talk)
Stefan Urbanek
•
11 years ago
Basics of Raspberry Pi
Maryala Srinivas
•
10 years ago
1320 IoT Trend and Disaster and Risk Management
Global Risk Forum GRFDavos
•
9 years ago
How do Things talk? IoT Application Protocols 101
Christian Götz
•
10 years ago