Home | Amazing | Today | Tags | Publishers | Years | Search 
The Economics of Contracts: Theories and Applications
The Economics of Contracts: Theories and Applications
A comprehensive and up-to-date synthesis of the economic analysis of contracts written by a specially commissioned team of leading international scholars. The book offers a well structured analysis of theoretical developments, the diverse fields of applications, the methodologies in use, and the policy implications at both firm and state level. The...
Quantifying and Controlling Catastrophic Risks
Quantifying and Controlling Catastrophic Risks
The perception, assessment and management of risk are increasingly important core principles for determining the development of both policy and strategic responses to civil and environmental catastrophes. Whereas these principles were once confined to some areas of activity i.e. financial and insurance, they are now widely used in civil and...
Windows Server 2008 Bible
Windows Server 2008 Bible

Moving to Windows Server 2008? Start with this book.

Windows Server 2008 has arrived with many new features and choices, and this hands-on reference shows you how to handle them all. Whether you're starting from scratch or upgrading, you'll find a wealth of information on how to install, configure, manage, and...

Active Directory For Dummies (Computer/Tech)
Active Directory For Dummies (Computer/Tech)

Fully updated with all the exciting AD enhancements!

Design and deploy Active Directory to simplify policy and security management

This is not your dad's AD! Whether you just need to upgrade your knowledge from previous versions or you're starting fresh with Active Directory, this...

Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive overview of terrorism, public and private sector counterterrorism, and "all hazards" emergency management. The book presents national, state, and local perspectives and up-to-date information, including the reorganization of the...
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
This volume provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information...
Geographic Information Systems and Science
Geographic Information Systems and Science

Geographic Information Systems and Science has become the pre-eminent textbook in its field, for students and practitioners alike. Its unique approach communicates the richness and diversity of GIS in a lucid and accessible format. This fully revised and updated second edition reinforces the view of GIS as a gateway to science and...

Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics)
Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics)
This book is a testament to collaboration. About five years ago, it became clear to several of us—at the University of Cambridge, Harvard Law School, and the University of Toronto—that we might accomplish more by working together, across institutions and continents, than we could by going it alone. Since that time, the Oxford Internet...
Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Every company needs to protect its people and other assets by managing risk in the hiring process!

Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be
...
Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise
Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise

A must-have for all companies undertakingservice-oriented architecture (SOA) governance

As SOA interest and adoption have accelerated rapidly, the challenges of governance have risen to the forefront across the entire industry. Without an SOA governance model, SOA adoption is stilted and hampered by a lack of...

Quantum Enigma: Physics Encounters Consciousness
Quantum Enigma: Physics Encounters Consciousness
The most successful theory in all of science--and the basis of one third of our economy--says the strangest things about the world and about us. Can you believe that physical reality is created by our observation of it? Physicists were forced to this conclusion, the quantum enigma, by what they observed in their laboratories.

Trying to
...
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy