|
|
|
|
Cross Site Scripting Attacks: Xss Exploits and DefenseCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they... | | | | InfoSecurity 2008 Threat AnalysisAn all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess... |
|
|
Getting Started with HIPAAThis is a practical and solutions-oriented text that presents HIPAA’s broad scope of guidelines in a clear and concise manner. It will provide confidence with your knowledge of the HIPAA Administrative Simplification legislation.
Does HIPAA affect you? HIPAA (Health Insurance Portability and Accountability Act) touches every aspect... | | Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware DevicesNagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of... | | Lippincott Manual of Nursing Practice
Completely updated for its Eighth Edition, this full-color classic reference is the one source every nurse needs for essential patient assessment and treatment guidelines. In an easy-to-read outline format, this clinically focused guide covers all disorders and patient problems in Medical-Surgical, Maternal-Neonatal, Pediatric, and... |
|
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences
Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, ... | | | | The Addiction Progress Notes Planner (PracticePlanners?)
PracticePlanners: The Bestselling treatment planning system for mental health professionals
The Addiction Progress Notes Planner, Third Edition contains complete prewritten session and patient presentation descriptions for each behavioral problem in The Addiction Treatment Planner, Fourth Edition. The... |
|
|
Result Page: 3 2 1 |