Home | Amazing | Today | Tags | Publishers | Years | Search 
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats and even terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16 year-old hacker. We are...
Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping
Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping
This book opens up three new topics in modern Chinese literary history: the intimate lives of Lu Xun and Xu Guangping as a couple; real and imagined love-letters in modern Chinese literature; and concepts of privacy in China. The scandalous affair between modern China's greatest writer and his former student is revealed in their letters to each...
The Promise of Mediation: The Transformative Approach to Conflict
The Promise of Mediation: The Transformative Approach to Conflict
The Guide on the Transformative Mediation Process

Praise for The Promise of Mediation

"The Promise of Mediation has been the single most significant influence on the modern ADR movement. This brilliant work serves as a constant reminder that mediation is about more than settling cases. Any serious student of the mediation...

VB.NET Language Pocket Reference
VB.NET Language Pocket Reference
Visual Basic .NET is a radically new version of Microsoft Visual Basic, the world's most widely used rapid application development (RAD) package. Whether you are just beginning application development with Visual Basic .NET or are already deep in code, you will appreciate just how easy and valuable the VB.NET Language Pocket Reference is....
J2EE Technology in Practice: Building Business Applications with the Java 2 Platform
J2EE Technology in Practice: Building Business Applications with the Java 2 Platform

Since its introduction, The Java 2 Platform, Enterprise Edition (J2EE) has achieved remarkable success among application server providers and their customers. More than a dozen leading application server companies have announced J2EE compatible products, and over one million developers have downloaded the J2EE SDK from Sun's J2EE Web site (...

Planning Extreme Programming
Planning Extreme Programming

The hallmarks of Extreme Programming--constant integration and automated testing, frequent small releases that incorporate continual customer feedback, and a teamwork approach--make it an exceptionally flexible and effective approach to software development. Once considered radical, Extreme Programming (XP) is rapidly becoming
...
E-Health Care Information Systems: An Introduction for Students and Professionals
E-Health Care Information Systems: An Introduction for Students and Professionals
E-Health Care Information Systems is a comprehensive collection written by leading experts from a range of disciplines including medicine, health sciences, engineering, business information systems, and computing technology. It provides a theoretical framework with sound methodological approaches and is filled with numerous case examples. Topics...
Competitive Voucher Schemes in Health: A Toolkit
Competitive Voucher Schemes in Health: A Toolkit
A Guide to Competitive Vouchers in Health provides a broad outline of the problems health systems face, the rationale behind government intervention particularly in the form of subsidies, and the different ways that governments and donors subsidize health care.

The guide provides readers with an understanding of the concept of competitive...

.NET Mobile Web Developer's Guide
.NET Mobile Web Developer's Guide
The .NET Mobile Web Developer's Guide provides a solid foundation for developing mobile applications using Microsoft technologies. With a focus on using ASP.NET and the .NET Mobile Internet Toolkit, .NET Mobile Web Developer's Guide will give you the insight to use Microsoft technologies for developing mobile applications. This book will also show...
Linux (Hacking Exposed)
Linux (Hacking Exposed)

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...

IBM Certification Study Guide Aix Hacmp
IBM Certification Study Guide Aix Hacmp
The AIX and RS/6000 Certifications offered through the Professional Certification Program from IBM are designed to validate the skills required of technical professionals who work in the powerful and often complex environments of AIX and RS/6000. A complete set of professional certifications is available. It includes:
Virtualization with Microsoft Virtual Server 2005
Virtualization with Microsoft Virtual Server 2005
A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of...
Result Page: 2274 2273 2272 2271 2270 2269 2268 2267 2266 2265 2264 2263 2262 2261 2260 2259 2258 2257 2256 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy