Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Reliability and Statistics in Geotechnical Engineering
Reliability and Statistics in Geotechnical Engineering

Probabilistic reasoning, statistical methods, and measures of engineering judgment are combined to develop a quantified approach for analyzing and managing risks in civil engineering systems and the applied earth sciences. The resulting risk analysis approach described in this book reflects an emerging trend in geotechnical engineering, natural...

Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
The marriage of computers and telecommunications, the integration of these technologies into a multimedia system of communication that has global reach, and the fact that they are available worldwide at low cost seems to be bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may...
E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support
E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support
Learn to produce evidence-quality data for legal counsel accurately, efficiently and cost-effectively.

One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI).
...
The Role of Evidence in Risk Characterization: Making Sense of Conflicting Data
The Role of Evidence in Risk Characterization: Making Sense of Conflicting Data
This book is one of the few that focus on the critical problem of the appropriate characterization of conflicting data for an adequate risk evaluation. It comprehensively coves the different approaches in various research areas in the US and in Europe, while also considering the psychological and ethical implications of risk evaluation. Special...
Service Oriented Architecture Field Guide for Executives
Service Oriented Architecture Field Guide for Executives
Service Oriented Architecture Field Guide for Executives is a fundamental breakthrough in the business and technology perspectives of service oriented architecture (SOA). A valuable resource to help you understand and realize the benefits of SOA in today's companies, this guide will show you how to plan, implement, and achieve SOA value....
Creative Careers in Hollywood
Creative Careers in Hollywood
In this candid guide, entertainment industry veteran Laurie Scheer offers a witty and informative inside look at the primary professions in the movie biz. Readers will discover real-life, yet upbeat portraits of the "shredder" jobs of the industry, such as assistant or d-girl, and how they can lead to the "keeper" jobs of actor,...
Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
This book is motivated by the following convictions:

1) Quantitative risk assessment (QRA) can be a powerful discipline for improving risk management decisions and policies.
2) Poorly conducted QRAs can produce results and recommendations that are worse than useless.
3) Sound risk assessment methods provide the benefits of QRA
...
Going to Extremes: How Like Minds Unite and Divide
Going to Extremes: How Like Minds Unite and Divide
Why do people become extremists? What makes people become so dismissive of opposing views? Why is political and cultural polarization so pervasive in America? Why do groups of teenagers, investors, and corporations take unnecessary risks? What leads groups to engage in such destructive acts as terrorism and ethic cleansing?

In
...
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, this guide shows you how to create a workable security program to protect your organization's internet risk. Softcover.

This report from METASeS is written for
...
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier

"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,...

Psychiatric Genetics: Applications in Clinical Practice
Psychiatric Genetics: Applications in Clinical Practice
Psychiatric Genetics is the first book to focus on clinical applications of genetics in psychiatry. It covers issues involved in genetic counseling, the interpretation of familial and genetic information for clinical use, information regarding risks associated with specific psychiatric disorders, and the uses of genetic testing. Written...
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy