Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Getting Started with HIPAA
Getting Started with HIPAA
This is a practical and solutions-oriented text that presents HIPAA’s broad scope of guidelines in a clear and concise manner. It will provide confidence with your knowledge of the HIPAA Administrative Simplification legislation.

Does HIPAA affect you? HIPAA (Health Insurance Portability and Accountability Act) touches every aspect...

Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
"I think this book will be the first standard introductory book on mobile agents." José M. Vidal, University of South Carolina
Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are
...
Data Protection & Compliance in Context
Data Protection & Compliance in Context

Data Protection and Compliance in Context is a comprehensive guide which: 1.explains the content of data protection laws; 2.provides practical advice on protecting data privacy under the Data Protection Act, human rights laws and freedom of information legislation; 3.gives data controllers a platform for building compliance strategies. Data...

Mobile Agents for Telecommunication Applications
Mobile Agents for Telecommunication Applications
Provides an overview of how the mobile code can be used in networking with the aim of developing further intelligent information retrieval, network and mobility management, and network services.

Proceedings of the Second International Workshop, MATA, on Mobile Agents for Telecommunication Applications, held in Paris, France,
...
Mars, A Cosmic Stepping Stone: Uncovering Humanity's Cosmic Context
Mars, A Cosmic Stepping Stone: Uncovering Humanity's Cosmic Context
The questions of our origin and cosmic abundance of life are among the most compelling facing humanity. We have determined much about the nature and origin of the Universe and our place in it, but with virtually all evidence of our origin long since gone from our world and an unimaginably vast Universe still to explore, defining answers are...
Freedom, Recognition and Non-Domination: A Republican Theory of (Global) Justice (Studies in Global Justice)
Freedom, Recognition and Non-Domination: A Republican Theory of (Global) Justice (Studies in Global Justice)

This book offers an original account of a distinctly republican theory of social and global justice. The book starts by exploring the nature and value of Hegelian recognition theory.  It shows the importance of that theory for grounding a normative account of free and autonomous agency.  It is this normative account of free agency...

Building a Server with FreeBSD 7
Building a Server with FreeBSD 7
The most difficult aspect of building a server (to act as a file server, Web server, or mail server) is the initial software installation and configuration. Getting your hands on the software is one thing; getting it all to function is another thing entirely. For many people, the only option is to hire an expensive consultant. Building a Server...
Least Privilege Security for Windows 7, Vista, and XP
Least Privilege Security for Windows 7, Vista, and XP

Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on...

Trade the Trader: Know Your Competition and Find Your Edge for Profitable Trading
Trade the Trader: Know Your Competition and Find Your Edge for Profitable Trading

When you trade, you're not just trading companies that deliver goods or services. You're trading against other traders who care about only one thing: taking your money. That's the #1 hard reality of trading - and most traders either don't know it, or don't act as if they do. In this book,...

The CPO: Transforming Procurement in the Real World
The CPO: Transforming Procurement in the Real World

In the novel The CPO: Transforming Procurement in the Real World, we meet Thomas Sutter, a German-American living in Dusseldorf and working as a procurement manager for a major global automobile manufacturer, Autowerke. On a chance encounter while flying to Chicago, he meets the CEO of Heartland, a major food company...

Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself
Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself

"Sloan's easy and informative writing makes for a thoroughly worthwhile update."--BARRON’S

"A useful corrective to the view of short selling as 'unpatriotic' or uniquely anti-social."--John Plender, Financial Times, November 16, 2009

"I liked this...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy