|
|
|
|
Prehospital Trauma Care
Comprehensive in scope and content, Prehospital Trauma Care (PTC) covers all aspects of emergency medicine-triage assessment and treatment, anesthesia, intensive care, psychiatry, health and military disasters, burns, shock, and surgery.
Written by over 70 distinguished international experts representing Australia, Austria, Belgium,... | | Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Well-known security experts decipher the most challenging aspect of cloud computing-security
Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access... | | Critical Indigenous Rights Studies (Routledge Research in Human Rights Law)
The field of ‘critical indigenous rights studies’ is a complex one that benefits from an interdisciplinary perspective and a realist (as opposed to an idealised) approach to indigenous peoples. This book draws on sociology of law, anthropology, political sciences and legal sciences in order to address emerging issues in... |
|
Hacking the Human
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of... | | Learning Veeam® Backup and Replication for VMware vSphere
Learn how to protect your data in your VMware vSphere infrastructure with Veeam®Backup & Replication
Overview
-
Explore Veeam Backup and Replication v7 infrastructure and its components
-
Create backup, replication, and restore strategies that protect data, your company's most...
| | Reversing: Secrets of Reverse Engineering
Sometimes, the best way to advance is in reverse
If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so... |
|
|
Data Protection for Virtual Data Centers
Essential information on how to protect data in virtual environments!
Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach,... | | The Internet: The Missing ManualThe Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing?
This utterly current book... | | |
|
|
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 |