|
|
|
|
|
Practice of System and Network Administration, The (2nd Edition)The first edition of The Practice of System and Network Administration introduced a generation of system and network administrators to a modern IT methodology. Whether you use Linux, Unix, or Windows, this newly revised edition describes the essential practices previously handed down only from mentor to... | | | | Resolving Ethical Dilemmas: A Guide for CliniciansEvery day clinicians face ethical dilemmas, many of which result from medical advances and challenges in managed care. How practitioners resolve these challenges has a direct impact on patient care. This timely Third Edition will keep you up to date on a wide range of ethical dilemmas and new ways of thinking about them. Highlights of this edition... |
|
Rudolph's Pediatrics
The 21st edition of Rudolph's Pediatrics continues a tradition of evolving and adapting to changes in pediatric medicine. Originally published in 1897 as Diseases of Infancy and Childhood, ... | | My War Criminal: Personal Encounters with an Architect of Genocide
An investigation into the nature of violence, terror, and trauma through conversations with a notorious war criminal by Jessica Stern, one of the world's foremost experts on terrorism.
Between October 2014 and November 2016, global terrorism expert Jessica Stern held a series of conversations in a... | | |
|
Lobbying in the European Union
This book sheds new light on how lobbying works in the European Union. Drawing on the first-hand professional experience of lobbyists, policymakers, and corporate and institutional stakeholders, combined with a sound academic foundation, it offers insights into successful lobbying strategies, such as how alliances are formed by... | | Medical Response to Terrorism: Preparedness and Clinical PracticeEven two decades ago, few would have imagined that terrorism would be planned and carried out on such an enormous scale as it is today. Terrorist attacks rely on horror and surprise, invoking different times, places, victims, and methods. Their purpose is to cause widespread confusion, fear, injury, and death. They disrupt security, ... | | Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |