Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
Blockchain: Blueprint for a New Economy
Blockchain: Blueprint for a New Economy

Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth...

The Dynamics and Complexities of Interracial Gay Families in South Africa: A New Frontier: Gay Relationships in South Africa (SpringerBriefs in Sociology)
The Dynamics and Complexities of Interracial Gay Families in South Africa: A New Frontier: Gay Relationships in South Africa (SpringerBriefs in Sociology)
This book provides an in-depth account of a qualitative study on the familial arrangements and domestic settings shaping interracial gay partnerships in the South African context, and it offers both empirical and theoretical insights on the topic. While heterosexual intimate relationships, particularly mixed-race couples, have attracted societal...
Fire Protection Engineering Applications for Large Transportation Systems in China
Fire Protection Engineering Applications for Large Transportation Systems in China
The rapid development of China’s transportation system brings huge challenges to fire safety issues. Fire Protection Engineering Applications for Large Transportation Systems in Chinaanalyzes key fire issues for large transportation systems in rail, airport, tunnels, etc. and offers solutions and best practices for similar...
Information Systems: The State of the Field (John Wiley Series in Information Systems)
Information Systems: The State of the Field (John Wiley Series in Information Systems)
The information systems field has contributed greatly to the rise of the information economy and the information society. Yet, after more than a quarter-century since its formation, it still is plagued by doubts about its identity and legitimacy. Information Systems: The State of the Field contains the reflections of leading IS scholars on...
Bomb the Suburbs: Graffiti, Race, Freight-Hopping and the Search for Hip-Hop's Moral Center
Bomb the Suburbs: Graffiti, Race, Freight-Hopping and the Search for Hip-Hop's Moral Center
Should graffiti writers organize to tear up the cities, or should they really be bombing the ‘burbs? That’s the question posed by William Upski Wimsatt in his seminal foray into the world of hip-hop, rap, and street art, and the culture and politics that surround it. But to say that the book deals only with taggers and hip-hop is...
Conscience: The Origins of Moral Intuition
Conscience: The Origins of Moral Intuition

How do we determine right from wrong? Conscience illuminates the answer through science and philosophy.

In her brilliant work Touching a Nerve, Patricia S. Churchland, the distinguished founder of neurophilosophy, drew from scientific research on the brain to understand its...

A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)

Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.

As the...

Anonymizing Health Data: Case Studies and Methods to Get You Started
Anonymizing Health Data: Case Studies and Methods to Get You Started

Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to...

Enterprise Security Architecture Using IBM Tivoli Security Solutions (IBM Redbooks)
Enterprise Security Architecture Using IBM Tivoli Security Solutions (IBM Redbooks)

This IBM Redbook looks at the overall Tivoli Enterprise Security Architecture, focusing on the integrated identity management solution covering authentication, authorization, provisioning, and privacy, as well as risk management throughout extensive e-business enterprise implementations. The available security product diversity in the...

Cultural Consultation: Encountering the Other in Mental Health Care (International and Cultural Psychology)
Cultural Consultation: Encountering the Other in Mental Health Care (International and Cultural Psychology)

Based on a recently completed project of cultural consultation in Montreal, Cultural Consultation presents a model of multicultural and applicable health care. This model used clinicians and consultants to provide in-depth assessment, treatment planning, and limited interventions in consultation with frontline primary care...

Interaction- und Interfacedesign: Web-, Game-, Produkt- und Servicedesign  Usability und Interface als Corporate Identity
Interaction- und Interfacedesign: Web-, Game-, Produkt- und Servicedesign Usability und Interface als Corporate Identity

Das Buch behandelt umfassend Grundlagen der Konzeption und Gestaltung visueller Systeme sowie interaktiver Dienstleistungen. Es hilft dabei, die interaktiven Eigenschaften und das Interface analoger und digitaler Produkte zu analysieren und projekt- und adressatenspezifische Konzepte für Website-, Game-, und Produktdesign, aber auch...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy