Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Financial Accounting: Information for Decisions (Available Titles CengageNOW)
Financial Accounting: Information for Decisions (Available Titles CengageNOW)

ACCOUNTING: INFORMATION FOR DECISIONS, 6th is proud to define excellence in its approach to Financial Accounting. Clearly illustrating that accounting is the language of business, all students will be able to drive excellence in their own careers when they start with this strong foundation. This innovative approach continues to provide...

Gaming, Simulations and Society: Research Scope and Perspective
Gaming, Simulations and Society: Research Scope and Perspective
This book presents a current research scope and perspective of Simulation and Gaming. Theoretical problems of Simulation and Gaming will be examined with a view to improving the social sciences through the introduction of the techniques and concepts of Simulation and Gaming. The fields of economics, political science, psychology and business...
Medical Informatics: Knowledge Management and Data Mining in Biomedicine (Integrated Series in Information Systems)
Medical Informatics: Knowledge Management and Data Mining in Biomedicine (Integrated Series in Information Systems)

Medical Informatics and biomedical computing have grown in quantum measure over the past decade. An abundance of advances have come to the foreground in this field with the vast amounts of biomedical and genomic data, the Internet, and the wide application of computer use in all aspects of medical, biological, and health care research and...

Gray Hat Hacking, Second Edition
Gray Hat Hacking, Second Edition
Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
An identity management system is defined as the management of the identity life cycle of entities (subjects or objects) during which the identity is established, described, and destroyed. What this definition fails to cover is the social, personal, and financial impact of the identity life cycle.

Before I joined Oracle as director of GRC
...
Animal Rights: A Reference Handbook (Contemporary World Issues)
Animal Rights: A Reference Handbook (Contemporary World Issues)

the controversy surrounding animal rights is divisive and potentially volatile. It divides society into three unequally sized groups. The first group is comprised of animal activists who believe that all human use of animals should stop immediately. The second group is society in general, which may or...

Maximum Wireless Security
Maximum Wireless Security

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code,...

Albright's Chemical Engineering Handbook
Albright's Chemical Engineering Handbook
Taking greater advantage of powerful computing capabilities over the last several years, the development of fundamental information and new models has led to major advances in nearly every aspect of chemical engineering. Albright’s Chemical Engineering Handbook represents a reliable source of updated methods, applications,...
Moral Intelligence: Enhancing Business Performance and Leadership Success
Moral Intelligence: Enhancing Business Performance and Leadership Success

"The authors offer a timely, important, and practical personal guidance system that anyone in the business world would do well to adopt. The world of business would be vastly improved if Moral Intelligence became required reading.”

Daniel Goleman, Author of...

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Molecular Forensics
Molecular Forensics

Molecular Forensics offers a comprehensive coverage of the increasingly important role that molecular analysis plays within forensic science. Starting with a broad introduction of modern forensic molecular technologies, the text covers key issues from the initial scenes of crime sampling to the use of evidential material in the...

Critical Care Management of the Obese Patient
Critical Care Management of the Obese Patient

This book provides health professionals with sound clinical advice on management of the obese patient admitted into hospital. It addresses all aspects of the patient's care, as well as serving as a resource to facilitate the management of services, use of clinical information, and negotiation of ethical issues that occur in intensive...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy