 |
|
 The Addiction Progress Notes Planner (PracticePlanners?)
PracticePlanners: The Bestselling treatment planning system for mental health professionals
The Addiction Progress Notes Planner, Third Edition contains complete prewritten session and patient presentation descriptions for each behavioral problem in The Addiction Treatment Planner, Fourth Edition. The... |  |  Secure Java: For Web Application Development
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure... |  |  Getting Started with HIPAAThis is a practical and solutions-oriented text that presents HIPAA’s broad scope of guidelines in a clear and concise manner. It will provide confidence with your knowledge of the HIPAA Administrative Simplification legislation.
Does HIPAA affect you? HIPAA (Health Insurance Portability and Accountability Act) touches every aspect... |
|
 Next Generation SSH2 Implementation: Securing Data in MotionThe most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book... |  |  Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware DevicesNagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of... |  |  |
|
 InfoSecurity 2008 Threat AnalysisAn all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess... |  |  Cross Site Scripting Attacks: Xss Exploits and DefenseCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they... |  |  Building a Cisco Wireless LANWireless LAN (Wi-Fi) technology is significantly more complex than cordless telephony; loss, coverage, and bandwidth requirements are much more stringent and the proliferation of wireless LANs in corporate environments has resulted in interesting security challenges. IEEE 802.11-based products offered by Cisco Systems have quickly become one of the... |
|
|
Result Page: 3 2 1 |