Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Android Hacker's Handbook
Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...

Total Information Risk Management: Maximizing the Value of Data and Information Assets
Total Information Risk Management: Maximizing the Value of Data and Information Assets

Many talk about the unlimited opportunities of data and information assets. But, bad data and information can also severely hurt your business and create considerable risk. Managing risk is a new angle to selling data quality projects to upper managers who do not want to take the time to learn about the value of data quality.

...

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

Challenges And Risks Of Genetically Engineered Organisms (Biological Resource Mangement in Agriculture)
Challenges And Risks Of Genetically Engineered Organisms (Biological Resource Mangement in Agriculture)

This book discusses the often diverging risks and opportunities associated with genetically engineered organisms in terms of the environment, food safety, and economics and trade. These issues were raised at the OECD Workshop on Challenges and Risks of GMOs - What Risk Analysis is Appropriate? Options for Future Policy Making Towards...

Nanomaterials in Pharmacology (Methods in Pharmacology and Toxicology)
Nanomaterials in Pharmacology (Methods in Pharmacology and Toxicology)

This detailed volume aims to introduce nanomaterials as a new therapeutic regimen in treating human diseases. Divided into four sections, it explores inorganic nanomaterials, organic nanomaterials, pharmaceutical properties of nanomaterials, and applications of nanomaterials in medicine. Several examples of inorganic and organic nanomaterials...

IT Security: Risking the Corporation
IT Security: Risking the Corporation

Even the world's largest and most sophisticated networks are vulnerable to attack-and so is yours. The scenarios described in IT Security:Risking the Corporation expose crucial flaws in operating systems, networks, servers, and software-as well as the vulnerability caused by poor training,...

The New Reality of Wall Street
The New Reality of Wall Street
"A lively, provocative, and comprehensive economic critique and analysis of investment intended for perilous periods and likely to be of enduring value."--Lawrence A. Cunningham, Author and Professor, Boston College

"Tracing the history of investment from the South Sea Bubble to America's bubble economy of the 1990s, Don Coxe has...

Food Safety Management: A Practical Guide for the Food Industry
Food Safety Management: A Practical Guide for the Food Industry

Food Safety Management: A Practical Guide for the Food Industry with an Honorable Mention for Single Volume Reference/Science in the 2015 PROSE Awards from the Association of American Publishers is the first book to present an integrated, practical approach to the management of food safety throughout the production chain. While many...

Researchers at Risk: Precarity, Jeopardy and Uncertainty in Academia (Palgrave Studies in Education Research Methods)
Researchers at Risk: Precarity, Jeopardy and Uncertainty in Academia (Palgrave Studies in Education Research Methods)
This book explores the phenomenon of researchers at risk: that is, the experiences of scholars whose research topics require them to engage with diverse kind of dangers, uncertainties or vulnerabilities. This risk may derive from working with variously marginalised individuals or groups, or from being members of such groups themselves. At other...
Building Internet Firewalls (2nd Edition)
Building Internet Firewalls (2nd Edition)
In the vast and varied universe of computer books, only a few stand out as the best in their subject areas. Building Internet Firewalls is one of those. It's deep, yet carefully focused, so that almost anything you might want to know about firewall strategies for protecting networks is here. In addition, there's lots of information on...
Endoscopy of the Upper GI Tract: A Training Manual
Endoscopy of the Upper GI Tract: A Training Manual
While technological advances have made endoscopy one of the most common procedures for examining the upper GI tract, learning how to maneuver the instruments and interpret the images can be frustrating for those without experience. Designed specifically for those in training, Endoscopy of the Upper GI Tract -- with over 770 illustrations...
Investing For Dummies, 4th Edition
Investing For Dummies, 4th Edition
Do you have a few investments that you would like to develop into a full investment plan? Would you like to know how to strengthen your portfolio? Perhaps you want to roll your 401(k) into a new plan? Whatever your agenda is, nowadays it’s hard to find good advice on where to invest your money.

Now you’ll have the ultimate...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy