Home | Amazing | Today | Tags | Publishers | Years | Search 
Ethics: The Heart of Health Care
Ethics: The Heart of Health Care

Ethics: The Heart of Health Care — a classic ethics text in medical, health and nursing studies — is recommended around the globe for its straightforward introduction to ethical analysis. In this Third Edition David Seedhouse again demonstrates tangibly and graphically how ethics and health care are inextricably...

Professional Blogging For Dummies
Professional Blogging For Dummies

Take your hobby to the next level and turn your blog into real income

Anyone who blogs knows that it is a fun, creative way for sharing thoughts and opinions. Now imagine making money from that hobby! This practical, how-to guide shows you how you can get serious about using your blog and implement advertising, sponsorship,...

The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff

“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...

Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step...

Corporate Blogging For Dummies
Corporate Blogging For Dummies

Establish a successful corporate blog to reach your customers

Corporate blogs require careful planning and attention to legal and corporate policies in order for them to be productive and effective. This fun, friendly, and practical guide walks you through using blogging as a first line of communication to customers and...

Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Well-known security experts decipher the most challenging aspect of cloud computing-security

Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access...

Facebook for Grown-Ups
Facebook for Grown-Ups

Facebook started out as a social network for high school and college kids. But now grown-ups like you are getting connected, too–even if you use Facebook much differently than your kids do. If you’re a grown-up looking to join the Facebook bandwagon, Facebook for Grown-Ups is just the guide you...

Mike Meyers' CompTIA A Guide to Managing & Troubleshooting PCs Lab Manual, Third Edition
Mike Meyers' CompTIA A Guide to Managing & Troubleshooting PCs Lab Manual, Third Edition

Practice the IT Skills Essential for Your Success

  • 115+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results
  • Key term quizzes help build...
802.11 Security
802.11 Security

802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent...

Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach

Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of...

How to Do Everything MacBook
How to Do Everything MacBook

Easy-to-follow coverage of portable Macs, including the MacBook, MacBook Pro, and MacBook Air

How to Do Everything: MacBook strongly emphasizes the portability and other unique features of the laptop versions of the Mac, examining ports and jacks, discussing user accounts and privacy, managing multiple network connections,...

Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy