Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

Family Business as Paradox (A Family Business Publication)
Family Business as Paradox (A Family Business Publication)

Rather than having to choose between the family and the business, the authors argue that if family-owned businesses can consciously manage and over time, perhaps, synthesize these contradictions, the Family Enterprise will have a long-term strategic and competitive advantage and the family will remain committed to continuity.

...
The Concept of Number: From Quaternions to Monads and Topological Fields (Mathematics and Its Applications)
The Concept of Number: From Quaternions to Monads and Topological Fields (Mathematics and Its Applications)
This book consists of lectures that I have given, in Darmstadt since 1974, under various titles, for beginners or students of the third semester.

I have tried to concentrate on those themes concerning numbers, which seem to me to be the most important on essential and historical grounds, and which in my opinion
...
An Atlas of Gynecologic Oncology
An Atlas of Gynecologic Oncology

While there are a plethora of practical texts relating to general gynecology, there are few specific to gynecological oncology. Taking a "cookbook" approach with clearly written and pictorial instructions, Atlas of Gynecologic Oncology: Investigation and Surgery describes and illustrates important procedures in the repertoire of a...

Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)

The best fully integrated study system available for the CompTIA Security+ exam!

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

With hundreds of...

Post-War Eugenics, Reproductive Choices and Population Policies in Greece, 1950s–1980s
Post-War Eugenics, Reproductive Choices and Population Policies in Greece, 1950s–1980s
This book sheds light on the history of Greek eugenics during the post-war period. At this time, eugenics had already been condemned by international declarations. Alexandra Barmpouti, however, challenges the assumption that eugenics disappeared and confirms the continuity of eugenics after the Second World War. She looks at the Greek...
Youth, Inequality and Social Change in the Global South (Perspectives on Children and Young People, 6)
Youth, Inequality and Social Change in the Global South (Perspectives on Children and Young People, 6)
This book gathers international and interdisciplinary work on youth studies from the Global South, exploring issues such as continuity and change in youth transitions from education to work; contemporary debates on the impact of mobility, marginalization and violence on young lives; how digital technologies shape youth experiences; and...
Games, Rhymes, and Wordplay of London Children
Games, Rhymes, and Wordplay of London Children
This book presents a unique annotated collection of some 2000 playground games, rhymes, and wordplay of London children. It charts continuity and development in childlore at a time of major social and cultural change and offers a detailed snapshot of changes in the traditions and language of young people. Topics include: starting a game;...
Technologies of International Relations: Continuity and Change
Technologies of International Relations: Continuity and Change

This book examines the role of technology in the core voices for International Relations theory and how this has shaped the contemporary thinking of ‘IR’ across some of the discipline’s major texts. Through an interview format between different generations of IR scholars, the conversations of the book analyse the...

The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The papers in this book present, for the first time, the world of warfare, both defensive and offensive, from the Classical periods to end of the Middle Ages in one collection. These scholarships have attracted ancient writers and generals and nowadays historians, archaeologists and researchers poliorcetics. Military historiography and...
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy