Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Digital Civil War: Confronting the Far-Right Menace
Digital Civil War: Confronting the Far-Right Menace
A frontline account of the social media battles raging between red and blue Americans – and how to find moral clarity in the chaos of digital civil war. 

Are rural white Christians the real Americans? Should teachers be armed or should the Second Amendment be repealed? Is abortion murder or
...
Population, Development, and the Environment: Challenges to Achieving the Sustainable Development Goals in the Asia Pacific
Population, Development, and the Environment: Challenges to Achieving the Sustainable Development Goals in the Asia Pacific
This book takes the reader into some of the most intransigent social, economic, and political issues that impact achieving sustainable development in Asia and the Pacific. Through meticulous analysis of the integrated relationships between population, development, and the environment, the chapters in this volume investigate the impacts of...
Algorithms of the Intelligent Web
Algorithms of the Intelligent Web
Web 2.0 applications provide a rich user experience, but the parts you can't see are just as important-and impressive. They use powerful techniques to process information intelligently and offer features based on patterns and relationships in data. Algorithms of the Intelligent Web shows readers how to use the same techniques employed by...
The Rough Guide to Bolivia 2 (Rough Guide Travel Guides)
The Rough Guide to Bolivia 2 (Rough Guide Travel Guides)

This thoroughly updated Rough Guide includes significantly more detailed maps and colour photographs than its closest competitor, as well as author picks and new colour sections that beautifully illustrate the countries ancient beliefs and mysticisms and the excellent range of outdoor activities on offer.

An updated history section...

Applied Mathematics for Science and Engineering
Applied Mathematics for Science and Engineering

Prepare students for success in using applied mathematics for engineering practice and post-graduate studies

• moves from one mathematical method to the next sustaining reader interest and easing the application of the techniques
• Uses different examples from chemical, civil, mechanical and various
...

The Polar Bear Expedition: The Heroes of America's Forgotten Invasion of Russia, 1918-1919
The Polar Bear Expedition: The Heroes of America's Forgotten Invasion of Russia, 1918-1919

In the brutally cold winter of 1919, 5,000 Americans battled the Red Army 600 miles north of Moscow. We have forgotten. Russia has not.

"AN EXCELLENT BOOK." —Wall Street Journal • "INCREDIBLE." — John U. Bacon •...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Cyber Racism: White Supremacy Online and the New Attack on Civil Rights (Pespectives on a Multiracial America Series)
Cyber Racism: White Supremacy Online and the New Attack on Civil Rights (Pespectives on a Multiracial America Series)
I have spent almost ten years doing the research for, thinking about, and finally writing this book. In the pages that follow, I emphasize the importance of understanding standpoint when critically evaluating information on the Internet, so it seems only fitting that I should say something about my own relation to the text.

This book
...
Next Generation Transport Networks: Data, Management, and Control Planes
Next Generation Transport Networks: Data, Management, and Control Planes

Covering past, present and future transport networks using three layered planes written by experts in the field.

Targeted at both practitioners and academics as a single source to get an understanding of how transport networks are built and operated

Explains technologies enabling the next generation transport...

Bridge Design and Evaluation: LRFD and LRFR
Bridge Design and Evaluation: LRFD and LRFR

A succinct, real-world approach to complete bridge system design and evaluation

Load and Resistance Factor Design (LRFD) and Load and Resistance Factor Rating (LRFR) are design and evaluation methods that have replaced or offered alternatives to other traditional methods as the new standards for designing and load-rating...

Result Page: 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy