Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
REST in Practice: Hypermedia and Systems Architecture
REST in Practice: Hypermedia and Systems Architecture

Why don't typical enterprise projects go as smoothly as projects you develop for the Web? Does the REST architectural style really present a viable alternative for building distributed systems and enterprise-class applications?

In this insightful book, three SOA experts provide a down-to-earth explanation of REST and...

Design and Usability of Digital Libraries: Case Studies in the Asia Pacific
Design and Usability of Digital Libraries: Case Studies in the Asia Pacific

Design and Usability of Digital Libraries: Case Studies in the Asia Pacific showcases some of the best digital library practices from organizations in the Asia Pacific. Particular emphasis has been placed on the design, use and usability of digital libraries. Not only are digital libraries examined, but related technologies, the management of...

Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
Cancer of the Gastrointestinal Tract: A Handbook for Nurse Practitioners (Handbook for Nurse Practitioners Series (Whurr))
Cancer of the Gastrointestinal Tract: A Handbook for Nurse Practitioners (Handbook for Nurse Practitioners Series (Whurr))

This text is a primer on the care of the patient with cancer of the gastrointestinal tract, for nurses who may not have experience in this demanding speciality.

The book begins with a comprehensive look at the issues and scope of the frequently used term "quality of life". Chapters two and three take an in-depth look at...

International Labour Organization and Global Social Governance
International Labour Organization and Global Social Governance
This open access book explores the role of the ILO (International Labour Organization) in building global social governance from multiple and mutually complementary perspectives. It explores the impact of this UN´s oldest agency, founded in 1919, on the transforming world of work in a global setting, providing insights...
Mobile and Wireless Communications
Mobile and Wireless Communications
One of the very first books published on the social impact of the mobile phone was Timo Kopomaa’s The City in Your Pocket: Birth of the Mobile Information Society. The book, published in 2000, was based on research that Kopomaa had undertaken for Nokia and Sonera as part of his doctoral studies in the Centre for Urban and Regional Studies at...
Parallel Algorithm Derivation and Program Transformation
Parallel Algorithm Derivation and Program Transformation
Transformational programming and parallel computation are two emerging fields that may ultimately depend on each other for success. Perhaps because ad hoc programming on sequential machines is so straightforward, sequential programming methodology has had little impact outside the academic community, and transformational methodology has had little...
Foundations of Computing
Foundations of Computing

It may sound surprising that in computing, a field which develops so fast that the future often becomes the past without having been the present, there is nothing more stable and worthwhile learning than its foundations.

It may sound less surprising that in a field with such a revolutionary methodological impact on all sciences and...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Deficit: Why Should I Care?
Deficit: Why Should I Care?

At the turn of this century, the American national debt stood at just under $6 trillion and the deficit at a "mere" $86 billion. Today, the national debt has topped $14 trillion, and the yearly deficit for 2011 is projected at a whopping $1.4 trillion.

According to the U.S. Treasury Department's Annual...

Questioning the Veil: Open Letters to Muslim Women
Questioning the Veil: Open Letters to Muslim Women

Across much of the world today, Muslim women of all ages are increasingly turning to wearing the veil. Is this trend a sign of rising piety or a way of asserting Muslim pride? And does the veil really provide women freedom from sexual harassment? Written in the form of letters addressing all those interested in this issue, Questioning the...

unlimited object storage image
Result Page: 144 143 142 141 140 139 138 137 136 135 134 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy