Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Firewall Policies and VPN Configurations
Firewall Policies and VPN Configurations
Deploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will...
Handbook of Cognitive-Behavioral Therapies, Fourth Edition
Handbook of Cognitive-Behavioral Therapies, Fourth Edition
Now revised and expanded with over 50% new material, this definitive clinical reference is the text of choice for graduate-level courses in evidence-based psychotherapy. Foremost authorities describe the conceptual and scientific foundations of cognitive-behavioral therapy (CBT) and provide a framework for assessment and case...
Neurocriminology: Forensic and Legal Applications, Public Policy Implications
Neurocriminology: Forensic and Legal Applications, Public Policy Implications

Neurocriminology: Forensic and Legal Applications, Public Policy Implications explores the dramatic impact of advances in neuroscience research and practice to our present understanding of criminality and crime control. Contemporary, cutting-edge research in neuroscience is cited and explained. Studies and cases are clearly...

Science and Practice of Strength Training
Science and Practice of Strength Training
Science and Practice of Strength Training is a favorite book among strength and conditioning professionals. Now in a third edition, it offers upgraded artwork, updates based on current science, and new information to enhance the practical application of the concepts presented. A new coauthor, Dr. Andrew Fry, joins the already-popular...
Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

Natural Products from Plants, Second Edition
Natural Products from Plants, Second Edition
The Council on Botanical and Horticultural Libraries

Annual Award for a Significant Work in Botanical or Horticultural Literature

From medicinal, industrial, and culinary uses to cutting-edge laboratory techniques in modern research and plant conservation strategies,...

Neuroergonomics: The Brain at Work (Oxford Series in Human-Technology Interaction)
Neuroergonomics: The Brain at Work (Oxford Series in Human-Technology Interaction)
Neuroergonomics can be defined as the study of brain and behavior at work. It combines two disciplines--neuroscience, the study of brain function, and human factors, the study of how to match technology with the capabilities and limitations of people so they can work effectively and safely. The goal of merging these two fields is to use the...
International Handbook of Adolescent Pregnancy: Medical, Psychosocial, and Public Health Responses
International Handbook of Adolescent Pregnancy: Medical, Psychosocial, and Public Health Responses

The rates are on the decline worldwide. But adolescent pregnancies still occur, placing millions of girls each year at risk for medical complications and social isolation and their babies for severe health problems-especially when prenatal care is inadequate or nonexistent.

But as the opportunity for young women and girls increases...

Pharmacogenomics: Social, Ethical, and Clinical Dimensions
Pharmacogenomics: Social, Ethical, and Clinical Dimensions
"In this remarkably broad and far-reaching work, editor Mark Rothstein and his distinguished list of contributors have laid out an impressive framework for the field. Beginning with a survey of public attitudes, and progressing through scientific, clinical, governmental, legal, economic, and societal issues, the text builds to a final...
Transient-Induced Latchup in CMOS Integrated Circuits
Transient-Induced Latchup in CMOS Integrated Circuits

The book all semiconductor device engineers must read to gain a practical feel for latchup-induced failure to produce lower-cost and higher-density chips. Transient-Induced Latchup in CMOS Integrated Circuits equips the practicing engineer with all the tools needed to address this regularly occurring problem while becoming more proficient at...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

New Developments in Infection and Inflammation in Urology, An Issue of Urologic Clinics, 1e (The Clinics: Surgery)
New Developments in Infection and Inflammation in Urology, An Issue of Urologic Clinics, 1e (The Clinics: Surgery)

This issue provides an up-to-date contemporary foundation on the topic of infection and inflammation. Multiple surveys have confirmed that conditions such as prostatitis, interstitial cystitis, and related syndromes continue to occupy a significant percentage of our outpatient clinical practice time. Inflammation may also hold the key to the...

unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy