Home | Amazing | Today | Tags | Publishers | Years | Search 
Road User Charging and Electronic Toll Collection
Road User Charging and Electronic Toll Collection

As highways, crossing points, and urban streets become increasingly jammed with traffic, more and more roadway authorities are turning to electronic tolling and pricing to manage traffic and road usage. This authoritative book offers professionals expert guidance in planning, procuring, and operating electronic tolling and road-user charging...

Doing Child and Adolescent Psychotherapy: Adapting Psychodynamic Treatment to Contemporary Practice
Doing Child and Adolescent Psychotherapy: Adapting Psychodynamic Treatment to Contemporary Practice
Almost 10 years ago I wrote a guide to child therapy. I worked hard, then, to make the book relevant, timely, and thorough. But a lot has happened over the past decade. The economics of mental health, a euphemism for managed care and insurance companies, have grown from supporters of what we do to dictators of it. Even as we meet...
Resumes For Dummies
Resumes For Dummies

Write a winning resume and land that job interview!

Is your job search stalling out after you submit a resume but before you're offered an interview? With a recession that has caused a 10% unemployment rate affecting 15.3 million Americans, having a winning resume is vital to securing an interview-and it demands a fresh look at...

Rethinking Enterprise Storage: A Hybrid Cloud Model
Rethinking Enterprise Storage: A Hybrid Cloud Model
Just as the Internet has fundamentally changed many industries, cloud computing is fundamentally changing the information technology industry, including infrastructures such as enterprise data storage. This book is about one of the new infrastructure game changers—a storage architecture called hybrid cloud storage that was...
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.

You will learn the basics of...

Data Protection & Compliance in Context
Data Protection & Compliance in Context

Data Protection and Compliance in Context is a comprehensive guide which: 1.explains the content of data protection laws; 2.provides practical advice on protecting data privacy under the Data Protection Act, human rights laws and freedom of information legislation; 3.gives data controllers a platform for building compliance strategies. Data...

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines...

Getting Started with Microsoft Lync Server 2013
Getting Started with Microsoft Lync Server 2013

Lync 2013 is a product that enables users to IM, and have audio and video conferences, including multi-party video. The mobile client permits the use of all the features in every device with an access-from-everywhere logic. The company’s Active Directory users, SharePoint documents, and Exchange objects integrate with Lync to deliver...

Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013
Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013

This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on...

Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security
Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy