Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nursing Law and Ethics
Nursing Law and Ethics

Nursing Law and Ethics explores a variety of key legal and ethical issues in nursing practice using a thought-provoking and holistic approach.  It addresses both what the law requires and what is right, and explores whether these two are always the same.

The book provides an overview of the legal, ethical and...

Activist Business Ethics
Activist Business Ethics
“The truth can wait, for it lives a long life”
(Arthur Schopenhauer, German philosopher, 1788-1860)

The philosopher Schopenhauer believed in the eventual triumph of truth, despite the disappointments engendered by his indifferent contemporaries. Two centuries later, we live in a time of accelerated changes, and we do not
...
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems...
The Best Damn Cybercrime and Forensics Book Period
The Best Damn Cybercrime and Forensics Book Period
As is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.

If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the
...
Cost Accounting: Foundations and Evolutions (Available Titles Cengagenow)
Cost Accounting: Foundations and Evolutions (Available Titles Cengagenow)
Cost accounting is a dynamic discipline constantly responding to the needs of managers in a highly competitive and global business world. Managers need cost accounting information to develop, implement, and evaluate strategy. Managers also need cost accounting measurements to determine product costs for internal management and...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Building Reputational Capital: Strategies for Integrity and Fair Play that Improve the Bottom Line
Building Reputational Capital: Strategies for Integrity and Fair Play that Improve the Bottom Line

In the aftermath of scandals such as those at Enron and WorldCom, there is a growing suspicion of the corporate world. For this reason it is more important than ever for firms to maintain a good reputation. In Building Reputational Capital, Kevin T. Jackson offers a practical guide to taking the high road--the only path that leads to...

How to Persuade People Who Don't Want to be Persuaded: Get What You Want-Every Time!
How to Persuade People Who Don't Want to be Persuaded: Get What You Want-Every Time!
If you’re in business, you’re selling something–a product, an opinion, a new way of doing things. The truth is, even if you don’t think of yourself as a pitchman, you might as well be one. This powerful guide to ethical influence shows you how to use effective persuasion techniques to get what you want the right...
Perioperative and Critical Care Medicine: Educational Issues 2005
Perioperative and Critical Care Medicine: Educational Issues 2005
Teaching is an ancient activity; it requires a predisposition and ability to transmit one’s own knowledge to others. It is also an innate quality that tends to strengthen over time, due to the interaction between teacher and pupil that develops and intensifies during their association, and to the ready availability of...
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Principles of Cloning
Principles of Cloning
In 1997, Dolly the cloned sheep began a biological revolution. She showed us the way to physiologically dedifferentiate already committed somatic cells, opening the gate to a whole new world of possibilities in the study of basic biological mechanisms that touch the origins of life at its core. It is clear that cloning vertebrates...
I Win, You Win: The Essential Guide to Principled Negotiation
I Win, You Win: The Essential Guide to Principled Negotiation

Negotiation is an essential skill in all areas of life. It is a series of maneuvers that we move through in order to get the best possible deal for ourselves, our company, or our organization. How far we will go to achieve our goals is where the rub lies. Full of useful exercises, case studies, and accessible advice, this book will...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy