Home | Amazing | Today | Tags | Publishers | Years | Search 
Anonymizing Health Data: Case Studies and Methods to Get You Started
Anonymizing Health Data: Case Studies and Methods to Get You Started

Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to...

Irish Imperial Networks: Migration, Social Communication and Exchange in Nineteenth-Century India
Irish Imperial Networks: Migration, Social Communication and Exchange in Nineteenth-Century India

This is an innovative study of the role of Ireland and the Irish in the British Empire which examines the intellectual, cultural and political interconnections between nineteenth-century British imperial, Irish and Indian history. Barry Crosbie argues that Ireland was a crucial sub-imperial centre for the British Empire in South Asia that...

Social Media and Integrated Marketing Communication: A Rhetorical Approach
Social Media and Integrated Marketing Communication: A Rhetorical Approach

Social Media and Integrated Marketing Communication: A Rhetorical Approach explores social media in the areas of corporate identity, brand narratives, and crisis response from a rhetorical perspective. Key ideas in this text are social media as epideictic rhetoric—the rhetorical...

Fashion Branding and Consumer Behaviors: Scientific Models (International Series on Consumer Science)
Fashion Branding and Consumer Behaviors: Scientific Models (International Series on Consumer Science)

Fashion Branding and Consumer Behaviors presents eye-opening theory, literature review and original research on the mutual influence of branding strategies and consumer response. Contributors use multiple methods to analyze consumers' psychosocial needs and the extent that their fulfillment goes beyond the usefulness or value of...

Social Engineering: The Art of Human Hacking
Social Engineering: The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the...

CompTIA Security+ Training Kit (Exam SY0-301) (Microsoft Press Training Kit)
CompTIA Security+ Training Kit (Exam SY0-301) (Microsoft Press Training Kit)

Ace your preparation for the skills measured by CompTIA Security+ Exam SY0-301. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying your knowledge to real-world case scenarios and practice exercises. This guide is designed to help...

Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Pro Oracle Fusion Applications: Installation and Administration
Pro Oracle Fusion Applications: Installation and Administration

Pro Oracle Fusion Applications is your one-stop source for help with installing Oracle’s Fusion Applications suite in your on-premise environment. It also aids in the monitoring and ongoing administration of your Fusion environment. Author Tushar Thakker is widely known for his writings and expertise on Oracle Fusion...

CompTIA Security+ Review Guide: Exam SY0-401
CompTIA Security+ Review Guide: Exam SY0-401

Focused review for the CompTIA Security+ certification exam

The CompTIA Security+ certification offers tremendous opportunities for IT professionals. For those who want to take their careers to the next level, CompTIA Security+ Review Guide: Exam SY0-401 is here to serve as a great resource for certification...

OpenStack Cloud Computing Cookbook - Third Edition
OpenStack Cloud Computing Cookbook - Third Edition

Over 110 effective recipes to help you build and operate OpenStack cloud computing, storage, networking, and automation

About This Book

  • Explore many new features of OpenStack's Juno and Kilo releases
  • Install, configure, and administer core projects with the help of OpenStack Object...
Interaction- und Interfacedesign: Web-, Game-, Produkt- und Servicedesign  Usability und Interface als Corporate Identity
Interaction- und Interfacedesign: Web-, Game-, Produkt- und Servicedesign Usability und Interface als Corporate Identity

Das Buch behandelt umfassend Grundlagen der Konzeption und Gestaltung visueller Systeme sowie interaktiver Dienstleistungen. Es hilft dabei, die interaktiven Eigenschaften und das Interface analoger und digitaler Produkte zu analysieren und projekt- und adressatenspezifische Konzepte für Website-, Game-, und Produktdesign, aber auch...

Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,...

Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy