Home | Amazing | Today | Tags | Publishers | Years | Search 
Paradiplomacy in Action: The Foreign Relations of Subnational Governments (Routledge Series in Federal Studies)
Paradiplomacy in Action: The Foreign Relations of Subnational Governments (Routledge Series in Federal Studies)
The international activities of regions have attracted considerable political and scholarly attention in recent years. This has perhaps been most notable in Europe, where the protagonism of regions within the EU and the alliances among regions have generated a substantial literature, but the phenomenon has also marked federal...
Improving Energy Efficiency in Industrial Energy Systems: An Interdisciplinary Perspective on Barriers, Energy Audits, Energy Management, Policies, and Programs (Green Energy and Technology)
Improving Energy Efficiency in Industrial Energy Systems: An Interdisciplinary Perspective on Barriers, Energy Audits, Energy Management, Policies, and Programs (Green Energy and Technology)

Industrial energy efficiency is one of the most important means of reducing the threat of increased global warming. Research however states that despite the existence of numerous technical energy efficiency measures, its deployment is hindered by the existence of various barriers to energy efficiency. The complexity of increasing energy...

Expert Oracle Application Express Security (Expert's Voice in Oracle)
Expert Oracle Application Express Security (Expert's Voice in Oracle)

Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development.  From basic settings that can enhance security, to preventing SQL Injection and Cross Site Scripting attacks, Expert Oracle Application Express Security shows how to secure your APEX...

Power Plays: Energy Options in the Age of Peak Oil
Power Plays: Energy Options in the Age of Peak Oil

Many people wonder: Are we really running out of oil, or is it all a ruse to drive prices up? Is nuclear power safe and economical? Is solar energy really the key to providing plenty of carbon-free energy? Do we have enough natural gas or coal to make any loss of oil production irrelevant?

In Power Plays: Energy Options in the...

Compensating Your Employees Fairly: A Guide to Internal Pay Equity
Compensating Your Employees Fairly: A Guide to Internal Pay Equity

Compensation fairness is a universal preoccupation in today’s workplace, from whispers around the water cooler to kabuki in the C-suite. Gender discrimination takes center stage in discussions of internal pay equity, but many other protected characteristics may be invoked as grounds for alleging discrimination: age, race, disability,...

Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs.

API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business functionalities to the outside world....

Identity Theft For Dummies
Identity Theft For Dummies

Practical solutions to help you deter, detect, and defend against identity theft In 2008, 9.9 million Americans became victims of identity theft. The cost exceeded $48 billion in 2008; consumers spend some $5 billion out-of-pocket each year to clear up resulting fraud issues. This guide will help keep you from becoming the next victim....

Testing Code Security
Testing Code Security

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and...

SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Next Generation Red Teaming
Next Generation Red Teaming

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s...

Chronic Total Occlusions: A Guide to Recanalization
Chronic Total Occlusions: A Guide to Recanalization

""Chronic total occlusions continue to represent one of the greatest challenges to interventional cardiologists."" - Cardiovascular Research Foundation - Chronic Total Occlusions or CTOs can be found in 30% of patients with coronary artery disease. Despite advances, CTOs remain one of the most frequently identified lesions...

Counterfeit Integrated Circuits: Detection and Avoidance
Counterfeit Integrated Circuits: Detection and Avoidance

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade.  The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs).  Not only does this book provide...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy