Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

Heaven Is Empty: A Cross-Cultural Approach to
Heaven Is Empty: A Cross-Cultural Approach to
In the past few decades, discussions on the role of religion in shaping the interconnections of politics, society, and culture have acquired a particular urgency. Since the end of the Cold War, after 9/11, and even more so with the surge of IS, religion has come to occupy a central position in discourses on the...
Ethical and Legal Issues in Human Resource Development: Evolving Roles and Emerging Trends
Ethical and Legal Issues in Human Resource Development: Evolving Roles and Emerging Trends

This book explores the role of HRD professionals in ethical and legal decision making in the workplace. While previous books have described the need for ethics in HRD, this book presents ways that HRD scholars and professionals can influence, through collaborative relationships, effective implementation of ethical policies and legal...

Children's Respiratory Nursing
Children's Respiratory Nursing

Children's Respiratory Nursing is a comprehensive, patient-centred text providing up-to-date information about the contemporary management of children with respiratory conditions. It looks at acute and chronic respiratory conditions in both primary and secondary health care sectors and explores the subject from a child- and...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Hacking For Dummies (For Dummies)
Hacking For Dummies (For Dummies)

Learn to hack your own system to protect against malicious attacks from outside

Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Institutions as Conscious Food Consumers: Leveraging Purchasing Power to Drive Systems Change
Institutions as Conscious Food Consumers: Leveraging Purchasing Power to Drive Systems Change

Institutions like schools, hospitals, and universities are not well known for having quality, healthy food. In fact, institutional food often embodies many of the worst traits of our industrialized food system, with long supply chains that are rife with environmental and social problems and growing market concentration in many stages...

Conscience: The Origins of Moral Intuition
Conscience: The Origins of Moral Intuition

How do we determine right from wrong? Conscience illuminates the answer through science and philosophy.

In her brilliant work Touching a Nerve, Patricia S. Churchland, the distinguished founder of neurophilosophy, drew from scientific research on the brain to understand its...

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Applied Deep Learning with Python: Use scikit-learn, TensorFlow, and Keras to create intelligent systems and machine learning solutions
Applied Deep Learning with Python: Use scikit-learn, TensorFlow, and Keras to create intelligent systems and machine learning solutions

A hands-on guide to deep learning that's filled with intuitive explanations and engaging practical examples

Key Features

  • Designed to iteratively develop the skills of Python users who don't have a data science background
  • Covers the key foundational concepts...
Essentials of Research Design and Methodology (Essentials of Behavioral  Science)
Essentials of Research Design and Methodology (Essentials of Behavioral Science)
Master the essential skills for designing and conducting a successful research project

Essentials of Research Design and Methodology contains practical information on how to design and conduct scientific research in the behavioral and social sciences. This accessible guide covers basic to advanced concepts in a clear, concrete, and readable...

Result Page: 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy