Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Rethinking Young People’s Marginalisation: Beyond neo-Liberal Futures? (Youth, Young Adulthood and Society)
Rethinking Young People’s Marginalisation: Beyond neo-Liberal Futures? (Youth, Young Adulthood and Society)

In the 21st century myriad earth systems – atmospheric systems, ocean systems, land systems, neo-Liberal capitalism – are in crisis. These crises are deeply related. Taking diverse and multiple forms, they have diverse and multiple consequences and are evidenced in such things as war, everyday violence, hate and...

Intensive Care of the Adult with Congenital Heart Disease (Congenital Heart Disease in Adolescents and Adults)
Intensive Care of the Adult with Congenital Heart Disease (Congenital Heart Disease in Adolescents and Adults)

Dedicated to the critical management of acutely ill adults with congenital heart disease, this comprehensive book discusses the many challenges faced in the management of these patients, who require intensive inter- and trans-disciplinary care. It provides the first universal review of the practical management of patients with these...

Performance Analysis of Communications Networks and Systems
Performance Analysis of Communications Networks and Systems
Performance analysis belongs to the domain of applied mathematics. The
major domain of application in this book concerns telecommunications systems
and networks. We will mainly use stochastic analysis and probability
theory to address problems in the performance evaluation of telecommunications
systems and networks. The first
...
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Out of Your Comfort Zone: Breaking Boundaries for a Life Beyond Limits
Out of Your Comfort Zone: Breaking Boundaries for a Life Beyond Limits
A step-by-step guide to conquering fear and creating an unstoppable mindset

• Offers a customizable approach that incorporates psychological, emotional, and physical techniques to release fear, limitations, and anxiety for good

• Provides a before-and-after measure of your comfort zone with the
...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Write Your Way To Success: Lessons Learned on my Path from Ordinary Developer to Author of Programming Books That Sell
Write Your Way To Success: Lessons Learned on my Path from Ordinary Developer to Author of Programming Books That Sell

Learn how to make an impact in the web world. This short book shows you that the best way to become an expert and a thought leader is to thoroughly research a topic and then publish a book on it. 

The great thing about writing a book is that you don’t have to risk anything - all you need is a few hours of...

Reasonably Simple Economics: Why the World Works the Way It Does
Reasonably Simple Economics: Why the World Works the Way It Does

The goal of Reasonably Simple Economics is, not surprisingly, simple: to help us think like economists. When we do, so much of the world that seemed mysterious or baffling  becomes more clear and understandable—improving our lives and providing new tools to succeed in business and career.

In a chatty style,...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of...
101 Boardroom Problems and How to Solve Them
101 Boardroom Problems and How to Solve Them
Before becoming a consultant on meetings and effective decision making, I was employed as an engineer. My motto then was: Silence is golden. Keeping quiet in meetings was safe and risk-free, and rarely did anyone solicit my ideas anyway. Had I shared my input, however, it might have improved the quality of my team’s decisions and reduced its...
Result Page: 96 95 94 93 92 91 90 89 88 87 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy