Home | Amazing | Today | Tags | Publishers | Years | Search 
Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data...
Privacy in Context: Technology, Policy, and the Integrity of Social Life
Privacy in Context: Technology, Policy, and the Integrity of Social Life

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself―most people understand that this is crucial to social life ―but the...

Best Practices in Talent Management: How the World's Leading Corporations Manage, Develop, and Retain Top Talent
Best Practices in Talent Management: How the World's Leading Corporations Manage, Develop, and Retain Top Talent

Praise for BEST PRACTICES in TALENT MANAGEMENT

"This book includes the most up-to-date thinking, tools, models, instruments and case studies necessary to identify, lead, and manage talent within your organization and with a focus on results. It provides it all—from thought leadership to real-world...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Ninja Innovation: The Ten Killer Strategies of the World's Most Successful Businesses
Ninja Innovation: The Ten Killer Strategies of the World's Most Successful Businesses

Innovate or die

For thirty years, Gary Shapiro has observed the world's most innovative businesses from his front-row seat as leader of the Consumer Electronics Association. Now he reveals the ten secrets of "ninja innovators" like Apple, Amazon, Google, Microsoft, and many others.

What does it take to...

Pharmaceutical Marketing
Pharmaceutical Marketing

The purpose of this title is to address some of the complex and controversial issues posed by pharmaceutical marketing. Specifically, articles in this work will address the impact of direct-to-consumer advertising of drugs, the marketing of drugs over the Internet, pharmaceutical companies' marketing policies, and the marketing of herbal...

Chronic Pain Management: Guidelines for Multidisciplinary Program Development
Chronic Pain Management: Guidelines for Multidisciplinary Program Development

Chronic Pain Management: Guidelines for Multidisciplinary Program Development is the most comprehensive textbook to date on the multidisciplinary approach to chronic pain management. Written by an illustrious group of contributors, this volume serves as a must-have armamentarium of guidelines for the development of a...

Advanced Persistent Training: Take Your Security Awareness Program to the Next Level
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

The Complete Direct Investing Handbook: A Guide for Family Offices, Qualified Purchasers, and Accredited Investors (Bloomberg Financial)
The Complete Direct Investing Handbook: A Guide for Family Offices, Qualified Purchasers, and Accredited Investors (Bloomberg Financial)

The practical guide to direct investing strategies and best practices

The Complete Direct Investing Handbook provides comprehensive guidelines, principles and practical perspectives on this increasingly attractive private equity investment strategy. Interviews with leading family office investors, qualified private...

Manipulation Under Anesthesia
Manipulation Under Anesthesia

Spinal manipulation under anesthesia (MUA) is a procedure intended for patients who suffer from musculoskeletal disorders in conjunction with biomechanical dysfunction. Performed using monitored anesthesia care, this technique is overcoming its controversial image and receiving regular use by a great number of practitioners.

...

Methamphetamine Use: Clinical and Forensic Aspects (Pacific Institute Series on Forensic Psychology)
Methamphetamine Use: Clinical and Forensic Aspects (Pacific Institute Series on Forensic Psychology)

A man is accused of attempted murder of a former crystal meth addict. He claims he shot in self-defense, responding to the extremely aggressive behavior the victim was exhibiting. How will this play out in court? Most likely, the prosecution and the defense will call various expert witnesses - perhaps neurologists, psychologists, pathologists...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy