Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Integrating Employee Health: A Model Program for NASA
Integrating Employee Health: A Model Program for NASA
The American workforce is changing, creating new challenges for employers to provide occupational health services to meet the needs of employees. First, a shift from manufacturing to services, knowledgecentered, and mobile work has changed the focus of occupational health from physical injury and exposure-related illness...
Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

Reshaping the Future: Education and Post-Conflict Reconstruction
Reshaping the Future: Education and Post-Conflict Reconstruction
The aim of Reshaping the Future is to draw international attention to the key role that education can play in both preventing conflict and in reconstructing post-conflict societies. The author also hopes to alert developing countries and donors alike to the devastating consequences of conflict on a country’s education systems and outcomes, as...
Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
Antigen Presenting Cells: From Mechanisms to Drug Development
Antigen Presenting Cells: From Mechanisms to Drug Development

This novel, multidisciplinary handbook highlights recent evidence that antigen presenting cells (APCs) are not only key players in the initiation or prevention of an antigen-specific T lymphocyte-mediated adaptive immune response, but also critical regulators and integrators in the interplay between our innate and adaptive immune system.

...
Substance Use Disorders (Practical Guides in Psychiatry)
Substance Use Disorders (Practical Guides in Psychiatry)

Revised, updated, and expanded, this handbook is a quick, concise, practical guide for clinicians treating patients with addictive disease. Using the conversational style and clinical vignettes found in all Practical Guides in Psychiatry titles, Dr. Gitlow describes effective strategies for the step-by-step process of...

The Ultimate Omega-3 Diet: Maximize the Power of Omega-3s to Supercharge Your Health, Battle Inflammation, and Keep Your Mind S
The Ultimate Omega-3 Diet: Maximize the Power of Omega-3s to Supercharge Your Health, Battle Inflammation, and Keep Your Mind S
Live longer, better, and healthier with omega-3s!

The Ultimate Omega-3 Diet is the first book to offer simple, practical steps for striking the proper balance between miraculous omega-3 fats and the less-healthy omega-6 fats to get the most out of your diet. Armed with the practical information in The Ultimate...

The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Handbook of Injury and Violence Prevention
Handbook of Injury and Violence Prevention
Injuries kill and maim millions each year, and seriously impact the lives of countless loved ones. Yet until recently they’ve been considered a random, normal part of life. Preventing injuries, on the other hand, requires not only effective communication with the public, but also a reliable framework for creating and evaluating suitable...
Security+ Guide to Network Security Fundamentals
Security+ Guide to Network Security Fundamentals

Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly preparing readers for the CompTIA Security+ SY0-301 certification exam. Its comprehensive introduction to practical network and computer...

Computer Security Handbook
Computer Security Handbook

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy