Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign...
CCDA Exam Certification Guide ((CP) CERTIFICATION)
CCDA Exam Certification Guide ((CP) CERTIFICATION)
The official study guide for DCN exam #640-441Coverage of the CCDA exam design objectives enables you to discover your knowledge gaps before the exam date. You'll learn to:Characterize a customer's existing network and identify customer needsSimplify the complexities associated with analyzing customer network problems and creating Cisco scalable...
The IAF Handbook of Group Facilitation: Best Practices from the Leading Organization in Facilitation
The IAF Handbook of Group Facilitation: Best Practices from the Leading Organization in Facilitation
Sponsored by the International Association of Facilitators, The IAF Handbook of Group Facilitation offers the need-to-know basics in the field brought together by fifty leading practitioners and scholars. This indispensable resource includes successful strategies and methods, foundations, and resources for anyone who works with groups.

The IAF...

Active Java: Object-Oriented Programming for the World Wide Web
Active Java: Object-Oriented Programming for the World Wide Web
The past four years have seen a phenomenal rise in interest in the Internet. Tens of millions of users regularly access this network to carry out operations such as browsing through electronic newspapers, downloading bibliographies, participating in news groups and emailing friends and colleagues. The number of applications that are hosted within...
PgMP Program Management Professional All-in-One Exam Guide
PgMP Program Management Professional All-in-One Exam Guide

Complete coverage of all the material on the PgMP certification exam

Get full coverage of all the material included on the PgMP Program Management Professional exam inside this comprehensive resource. Written by industry expert, trainer, and project management consultant Joseph Phillips, this definitive exam guide covers...

JUNOS Enterprise Switching
JUNOS Enterprise Switching
Charles Darwin once said, “I have called this principle, by which each slight variation, if useful, is preserved, by the term of Natural Selection.” This principle of evolution applies to business as well as to nature. Individuals, companies, and industries evolve and compete with one another in preparation for the future.
...
Beyond the Bottom Line: Socially Innovative Business Owners
Beyond the Bottom Line: Socially Innovative Business Owners

Quarter examines business owners who use their firms as laboratories for social innovation. After providing an introduction to this phenomenon in an historical perspective and discussing the 19th-century British industrialist Robert Owen, he provides ll case studies of contemporary innovators from six countries-the UK, US, the Netherlands,...

Blood Science: Principles and Pathology
Blood Science: Principles and Pathology

Blood Science is a relatively new discipline which merges biochemistry, haematology, immunology, transfusion science and genetics. This bringing together of traditional disciplines requires a corresponding change in education and training for healthcare scientists and Blood Science: Principles and Pathology is written in response to this...

Pharmacogenomics in Admixed Populations (Medical Intelligence Unit (Unnumbered))
Pharmacogenomics in Admixed Populations (Medical Intelligence Unit (Unnumbered))

Ethnic specificity has become an integral part of research in the overlapping sciences of pharmacogenetics and pharmacogenomics. Pharmacogenomics in Admixed Populations was conceived to compile pharmacogenetic/-genomic (PGx) data from peoples of four continents: Africa, America, Asia and Oceania, where admixture and population stratification...

Java EE 7 First Look
Java EE 7 First Look

Discover the new features of Java EE 7 and learn to put them together to build a large-scale application

Overview

  • Explore changes brought in by the Java EE 7 platform
  • Master the new specifications that have been added in Java EE to develop applications without any hassle
  • ...
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab

Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!

Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a...

Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Over the last two or three decades, elliptic curves have been playing an increasingly important role both in number theory and in related fields such as cryptography. For example, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality...
unlimited object storage image
Result Page: 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy