Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
The marriage of computers and telecommunications, the integration of these technologies into a multimedia system of communication that has global reach, and the fact that they are available worldwide at low cost seems to be bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may...
Survival Analysis Using S: Analysis of Time-to-Event Data (Chapman & Hall/CRC Texts in Statistical Science)
Survival Analysis Using S: Analysis of Time-to-Event Data (Chapman & Hall/CRC Texts in Statistical Science)
Survival Analysis Using S: Analysis of Time-to-Event Data is designed as a text for a one-semester or one-quarter course in survival analysis for upper-level or graduate students in statistics, biostatistics, and epidemiology. Prerequisites are a standard pre-calculus first course in probability and statistics, and a course in applied...
Windows Server 2008 Security Resource Kit (PRO - Resource Kit)
Windows Server 2008 Security Resource Kit (PRO - Resource Kit)

In your opinion, which network faces the biggest security risk today: the small office with multiple power users or large corporation with a large LUA base?

The unmanaged networks. I have seen very well managed and very secure networks in both small and large organizations, and I have seen poorly managed and very
...

Going to Extremes: How Like Minds Unite and Divide
Going to Extremes: How Like Minds Unite and Divide
Why do people become extremists? What makes people become so dismissive of opposing views? Why is political and cultural polarization so pervasive in America? Why do groups of teenagers, investors, and corporations take unnecessary risks? What leads groups to engage in such destructive acts as terrorism and ethic cleansing?

In
...
Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Convergence in Information and Communication Technology: Strategic and Regulatory Considerations
Convergence in Information and Communication Technology: Strategic and Regulatory Considerations

Growth in the information and technology (ICT) sector has exploded over the past 20 years. Dynamic market and technology developments have led to a phenomenon known as convergence, defined in this volume as the erosion of boundaries between previously separate ICT services, networks, and business practices. Examples include cable television...

Never Buy Another Stock Again: The Investing Portfolio that Will Preserve Your Wealth and Your Sanity
Never Buy Another Stock Again: The Investing Portfolio that Will Preserve Your Wealth and Your Sanity

Want to build long-term, sustainable wealth? Then stay out of the stock market!

 

That’s radically different advice from what the "experts" have served up for decades… but look at the miserable results those pundits have...

South Korea’s 70-Year Endeavor for Foreign Policy, National Defense, and Unification
South Korea’s 70-Year Endeavor for Foreign Policy, National Defense, and Unification
This book brings Korea's finest foreign policy minds together in contemplating the risks and rewards of finally ending the 70 year stalemate between North and South Korea through reunification. While North Korea is in conflict with the United States over denuclearization and regime security, the South Korean government is focusing on...
Network Security with OpenSSL
Network Security with OpenSSL
OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges. Focused on the...
Nuclear, Chemical, and Biological Terrorism: Emergency Response and Public Protection
Nuclear, Chemical, and Biological Terrorism: Emergency Response and Public Protection
This book provides guidance on measures that should be considered to protect human lives from terrorist activities involving nuclear, chemical, and biological weapons. It provides a historical summary of the development and use of these weapons, and continues with a detailed discussion of the types of radiation and warfare agents that are...
Anonymizing Health Data: Case Studies and Methods to Get You Started
Anonymizing Health Data: Case Studies and Methods to Get You Started

Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to...

Grow to Greatness: Smart Growth for Entrepreneurial Businesses
Grow to Greatness: Smart Growth for Entrepreneurial Businesses

Simply put, most entrepreneurial start-ups fail. Those fortunate enough to succeed then face a second, major challenge: how to grow. This book focuses on the key questions an entrepreneur must answer in order to grow a business. Based on extensive research of more than fifty successful growth companies, Grow to Greatness discusses the...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy