|
|
|
|
|
Computer Fraud Casebook: The Bytes that BiteIn 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer... | | Antigen Presenting Cells: From Mechanisms to Drug Development
This novel, multidisciplinary handbook highlights recent evidence that antigen presenting cells (APCs) are not only key players in the initiation or prevention of an antigen-specific T lymphocyte-mediated adaptive immune response, but also critical regulators and integrators in the interplay between our innate and adaptive immune system. ... | | Substance Use Disorders (Practical Guides in Psychiatry)
Revised, updated, and expanded, this handbook is a quick, concise, practical guide for clinicians treating patients with addictive disease. Using the conversational style and clinical vignettes found in all Practical Guides in Psychiatry titles, Dr. Gitlow describes effective strategies for the step-by-step process of... |
|
|
Handbook of Injury and Violence PreventionInjuries kill and maim millions each year, and seriously impact the lives of countless loved ones. Yet until recently they’ve been considered a random, normal part of life. Preventing injuries, on the other hand, requires not only effective communication with the public, but also a reliable framework for creating and evaluating suitable... | | Security+ Guide to Network Security Fundamentals
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly preparing readers for the CompTIA Security+ SY0-301 certification exam. Its comprehensive introduction to practical network and computer... | | Computer Security HandbookThe definitive formula for computer security, from power outages to theft and sabotage
Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and... |
|
|
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |