Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise-Wide Change: Superior Results Through Systems Thinking (Jossey-Bass Series)
Enterprise-Wide Change: Superior Results Through Systems Thinking (Jossey-Bass Series)

Leave piecemeal strategic change approaches behind and learn how to plan, facilitate, and integrate your change efforts for lasting success. Enterprise-Wide Change takes you through the "Rollercoaster of Change," showing you how to deal with resistance, regard skeptics as your best friends, and build a buy-in and stay-in strategy among...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
IPv6 Network Programming
IPv6 Network Programming
Ipv6 Network Programming contains everything you need to make your application program support IPv6. This book covers Ipv6 with a focus on two of the most timely and relevant topics: security and portability. IPv6 socket APIs (RFC2553) are fully described with real-world examples. They are implemented with security in mind, leading you to write...
Marketing Your Consulting Services : A Business of Consulting Resource
Marketing Your Consulting Services : A Business of Consulting Resource
"Elaine Biech keeps her promises. Just open Marketing Your Consulting Services to the preface, and you see that she promises practical. Then she immediately delivers— on the very same page! Flip to any page, and the same is true. That's a stunning achievement. And Elaine's advice works. I tried one of her first fourteen...
Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Nutraceutical Proteins and Peptides in Health and Disease (Nutraceutical Science and Technology)
Nutraceutical Proteins and Peptides in Health and Disease (Nutraceutical Science and Technology)

Reports of the beneficial health effects of some peptides have begun to make their way into the scientific literature. Peptides can act as immunomodulators, and have been shown to have a positive influence on calcium absorption, and on regulation of serum cholesterol. A number of peptides may also possess antimicrobial properties that enhance...

Lawyers at Work
Lawyers at Work

"With probing questions and articulate answers, Cosslett and her subjects shed light on the challenges of legal practice in the current legal market." BLS Law Notes, 11.16.12

Lawyers at Work reveals what it means and what it takes to be a satisfied, sane, and successful lawyer in today’s tough...

Research Directions in Data and Applications Security XVIII
Research Directions in Data and Applications Security XVIII

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and...

Dynamic Vision for Perception and Control of Motion
Dynamic Vision for Perception and Control of Motion
The application of machine vision to autonomous vehicles is an increasingly important area of research with exciting applications in industry, defense, and transportation likely in coming decades.

Dynamic Vision for Perception and Control of Road Vehicles has been written by the world's leading expert on autonomous road-following...

Games And Simulations in Online Learning: Research And Development Frameworks
Games And Simulations in Online Learning: Research And Development Frameworks
Nearly all early learning happens during play, and new technology has added video games to the list of ways children learn interaction and new concepts. Although video games are everywhere, on Web sites, in stores, streamed to the desktop, on television, they are absent from the classroom. Computer-based simulations, a form of computer games, have...
Android Malware (SpringerBriefs in Computer Science)
Android Malware (SpringerBriefs in Computer Science)

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile...

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy