Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Tell Your Children: The Truth About Marijuana, Mental Illness, and Violence
Tell Your Children: The Truth About Marijuana, Mental Illness, and Violence
An eye-opening report from an award-winning author and former New York Times reporter reveals the link between teenage marijuana use and mental illness, and a hidden epidemic of violence caused by the drug—facts the media have ignored as the United States rushes to legalize cannabis.

Recreational
...
Financial Econometrics, Mathematics and Statistics: Theory, Method and Application
Financial Econometrics, Mathematics and Statistics: Theory, Method and Application

This rigorous textbook introduces graduate students to the principles of econometrics and statistics with a focus on methods and applications in financial research. Financial Econometrics, Mathematics, and Statistics introduces tools and methods important for both finance and accounting that assist with asset...

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation,...

Diagnosis and Surgical Management of Renal Tumors
Diagnosis and Surgical Management of Renal Tumors
Renal cell carcinoma (RCC) is the most common primary malignancy of the kidney, with an estimated 64,000 new cases diagnosed each year in the United States. Worldwide, this figure approaches 270,000 annual incident cases. At the time of initial presentation, 80% of patients with RCC will be diagnosed with a tumor localized the kidney. The...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
SQL Server 2017 Query Performance Tuning: Troubleshoot and Optimize Query Performance
SQL Server 2017 Query Performance Tuning: Troubleshoot and Optimize Query Performance

Identify and fix causes of poor performance. You will learn Query Store, adaptive execution plans, and automated tuning on the Microsoft Azure SQL Database platform. Anyone responsible for writing or creating T-SQL queries will find valuable the insight into bottlenecks, including how to recognize them and eliminate them.

...

IFRS 9 and CECL Credit Risk Modelling and Validation: A Practical Guide with Examples Worked in R and SAS
IFRS 9 and CECL Credit Risk Modelling and Validation: A Practical Guide with Examples Worked in R and SAS

IFRS 9 and CECL Credit Risk Modelling and Validation covers a hot topic in risk management. Both IFRS 9 and CECL accounting standards require Banks to adopt a new perspective in assessing Expected Credit Losses. The book explores a wide range of models and corresponding validation procedures. The most traditional regression...

Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
A Guide to IT Contracting: Checklists, Tools, and Techniques
A Guide to IT Contracting: Checklists, Tools, and Techniques

Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal...

Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Result Page: 95 94 93 92 91 90 89 88 87 86 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy