Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Essentials of Physician Practice Management
Essentials of Physician Practice Management

Essentials of Physician Practice Management offers a practical reference for administrators and medical directors and provides a comprehensive text for those preparing for a career in medical administration, practice management, and health plan administration. Essentials of Physician Practice Management is filled with valuable...

Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Overview

  • Learn sample forms and process flows for quick and easy use.
  • An easy-to-follow reference for implementing information security in the enterprise.
  • Learn...
A Textbook of Modern Toxicology
A Textbook of Modern Toxicology
A state-of-the-art toxicology textbook—ideal for students and professionals

Toxicology is a multifaceted field that encompasses the physical and chemical study of all known poisonous substances. It involves the rigorous analysis of toxicants and their effects on living tissues, forensic toxicology, quality assurance...

Principles of Biochemical Toxicology, Fourth Edition
Principles of Biochemical Toxicology, Fourth Edition
This leading textbook in the field examines the mechanisms underlying toxicity, particularly the events at the molecular level and the factors that determine and affect toxicity. The new edition is updated to reflect the latest research into the biochemical basis of toxicology and the growing concerns over the adverse effects of drugs,...
The Social Media Business Equation
The Social Media Business Equation

My journey down the social media road began years ago, and many people have praised me for my foresight and brilliance. They are very kind, but the truth is, what really took me down this road was desperation. A few years ago—perhaps you remember—the economy took a heck of a dip. On its way down, it punched me in the...

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
"A wise and thorough investigation." - Lawrence Wright, author of The Looming Tower and The Terror Years

Starting in late 2012, Westerners working in Syria -- journalists and aid workers -- began disappearing without a trace. A year later the world learned they had been taken hostage by the
...
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Conquest in Cyberspace: National Security and Information Warfare
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies...
Principles of Information Security
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the smooth operation of communication and computing solutions becomes vital. However, recurring events such as virus and worm attacks and the success of criminal attackers illustrate the weaknesses in current information technologies and the...
Python for Finance: Analyze Big Financial Data
Python for Finance: Analyze Big Financial Data

The financial industry has adopted Python at a tremendous rate recently, with some of the largest investment banks and hedge funds using it to build core trading and risk management systems. This hands-on guide helps both developers and quantitative analysts get started with Python, and guides you through the most important aspects...

unlimited object storage image
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy