Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Prehospital Trauma Care
Prehospital Trauma Care

Comprehensive in scope and content, Prehospital Trauma Care (PTC) covers all aspects of emergency medicine-triage assessment and treatment, anesthesia, intensive care, psychiatry, health and military disasters, burns, shock, and surgery.
Written by over 70 distinguished international experts representing Australia, Austria, Belgium,
...

Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Well-known security experts decipher the most challenging aspect of cloud computing-security

Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access...

Critical Indigenous Rights Studies (Routledge Research in Human Rights Law)
Critical Indigenous Rights Studies (Routledge Research in Human Rights Law)

The field of ‘critical indigenous rights studies’ is a complex one that benefits from an interdisciplinary perspective and a realist (as opposed to an idealised) approach to indigenous peoples. This book draws on sociology of law, anthropology, political sciences and legal sciences in order to address emerging issues in...

Hacking the Human
Hacking the Human

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...

Learning Veeam® Backup and Replication for VMware vSphere
Learning Veeam® Backup and Replication for VMware vSphere

Learn how to protect your data in your VMware vSphere infrastructure with Veeam®Backup & Replication

Overview

  • Explore Veeam Backup and Replication v7 infrastructure and its components
  • Create backup, replication, and restore strategies that protect data, your company's most...
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering

Sometimes, the best way to advance is in reverse

If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so...

Spatial Data on the Web: Modeling and Management
Spatial Data on the Web: Modeling and Management
Spatial data is essential in a wide range of application domains today. While geographical applications remain the key target area, spatial properties are required in other contexts such as computer-aided design, robotics and image processing. Associated with these is the constantly growing number of distributed processing architectures, based on,...
Handbook of Brewing: Processes, Technology, Markets
Handbook of Brewing: Processes, Technology, Markets

This comprehensive reference combines the technological know-how from five centuries of industrial-scale brewing to meet the needs of a global economy. The editor and authors draw on the expertise gained in the world's most competitive beer market (Germany), where many of the current technologies were first introduced.

Following a look...

IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

Implement an Effective Security Metrics Project or Program

IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the...

Data Protection for Virtual Data Centers
Data Protection for Virtual Data Centers

Essential information on how to protect data in virtual environments!

Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach,...

The Internet: The Missing Manual
The Internet: The Missing Manual

The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing?

This utterly current book...

Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)

Here are some sure things: you can't get a virus by simply reading an email. Malicious code can't harm hardware. A virus can't hide from a booted, write-protected diskette. Your computer can't get infected from a picture file. I have given this advice hundreds of times and could repeat it in my sleep. It was the mantra of every...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy