Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
This book focuses on the application of ionic liquids in flow assurance in the oil and gas industry. It discusses their physiochemical properties, and considers the role of ionic liquids as gas hydrate inhibitors in offshore pipelines.

Gas hydrate occurrence can pose a major threat to pipeline integrity. Therefore, different...

Tame Your Anxiety: Rewiring Your Brain for Happiness
Tame Your Anxiety: Rewiring Your Brain for Happiness

Anxiety is natural. Calm is learned.

If you didn’t learn yesterday, you can learn today.

It’s not easy, of course. Once your natural alarm system is triggered, it’s hard to find the off switch. Indeed, you don’t have an off switch until you build one....

Effective Complaint Management (Management for Professionals)
Effective Complaint Management (Management for Professionals)

This practice- and research-based book caters to the needs of executive managers who see customer satisfaction as their primary goal. The authors identify the need for an effective complaint management strategy that prevents the loss of dissatisfied customers. Dissatisfied customers are at risk of migrating; accordingly,...

Coping with Caveats in Coalition Warfare: An Empirical Research Program
Coping with Caveats in Coalition Warfare: An Empirical Research Program
This book develops a framework for analysis, and a set of research strategies, to better understand the conditions and mechanisms involved in the considerable use of caveats by states contributing militarily to coalition operations. In the professional language of military servicemen, security analysts and decision-makers, “caveats”...
The Lessons of Tragedy: Statecraft and World Order
The Lessons of Tragedy: Statecraft and World Order
An eloquent call to draw on the lessons of the past to address current threats to international order

The ancient Greeks hard?wired a tragic sensibility into their culture. By looking disaster squarely in the face, by understanding just how badly things could spiral out of control, they sought to create a
...
The Osteoporosis Manual: Prevention, Diagnosis and Management
The Osteoporosis Manual: Prevention, Diagnosis and Management

This comprehensive manual covers all aspects of the prevention, diagnosis and management of osteoporosis, offering an upbeat and optimistic assessment of what can be achieved. While scientifically based, the book provides easy-to-follow guidelines for lifelong maintenance of skeletal structure and function. It deals with everything...

Cato the Younger: Life and Death at the End of the Roman Republic
Cato the Younger: Life and Death at the End of the Roman Republic
Marcus Porcius Cato ("the Younger") is most famous for being Julius Caesar's nemesis. His sustained antagonism was in large part responsible for pushing the Romans towards civil war. Yet Cato never wanted war even though he used the threat of violence against Caesar. This strategic gamble misfired as Caesar, instead of...
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

Permanent Revolution: The Reformation and the Illiberal Roots of Liberalism
Permanent Revolution: The Reformation and the Illiberal Roots of Liberalism

How did the Reformation, which initially promoted decidedly illiberal positions, end up laying the groundwork for Western liberalism?

The English Reformation began as an evangelical movement driven by an unyielding belief in predestination, intolerance, stringent literalism, political quietism, and
...

Power Trip: The Story of Energy
Power Trip: The Story of Energy
A global tour of energy--the builder of human civilization and also its greatest threat.

Energy is humanity's single most important resource. In fact, as energy expert Michael E. Webber argues in Power Trip, the story of how societies rise can be told largely as the story of how they manage energy...
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy