Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats and even terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16 year-old hacker. We are...
The Cosmic Gift
The Cosmic Gift
An Indian research submarine was exploring the ocean-bed off the coast ofParson's Pygmalion Point, the southern -most tip ofI ndia. Its young Captain, Uttarna, and his crew gazed ent ranced at the strange world under water , strangely lit here and there with many-shaped coral reefs , amidst which innumerable varieties ofcolo urful fish and...
The Warren Buffett Way, Second Edition
The Warren Buffett Way, Second Edition
PRAISE FOR THE WARREN BUFFETT WAY
FIRST EDITION

"Nobody has described what Buffett practices better than Hagstrom."
--Time

"Simply the most important new stock book . . . If you think you know all about Warren Buffett, you have a lot to learn from this book."
--Forbes

"It’s...

Pro Hadoop
Pro Hadoop
You’ve heard the hype about Hadoop: it runs petabyte–scale data mining tasks insanely fast, it runs gigantic tasks on clouds for absurdly cheap, it’s been heavily committed to by tech giants like IBM, Yahoo!, and the Apache Project, and it’s completely open source (thus free). But what exactly is it, and more...
Trusted Computing Platforms: Design and Applications
Trusted Computing Platforms: Design and Applications
Many scenarios in modern computing give rise to a common problem: why
should Alice trust computation that’s occurring at Bob’s machine? (The computer
security field likes to talk about “Alice” and “Bob” and protection against
an “adversary” with certain abilities.) What if Bob, or
...
Trustworthy Execution on Mobile Devices (SpringerBriefs in Computer Science)
Trustworthy Execution on Mobile Devices (SpringerBriefs in Computer Science)

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed...

The Montessori Toddler: A Parent's Guide to Raising a Curious and Responsible Human Being
The Montessori Toddler: A Parent's Guide to Raising a Curious and Responsible Human Being
Turn your home into a Montessori home—and become a more mindful, attentive, and easygoing parent.

It’s time to change the way we see toddlers. Using the principles developed by the educator Dr. Maria Montessori, Simone Davies shows how to turn life with a “terrible two” into a mutually rich
...
The Little Blue Book of Marketing: Build a Killer Plan in Less Than a Day
The Little Blue Book of Marketing: Build a Killer Plan in Less Than a Day
A step-by-step guide to creating an actionable marketing plan-fast

A great marketing plan identifies where an organization is, where it wants to be, and how it will get there. Most companies think they already have such a plan-but often they really have only a budget, a sales goal, or an excuse.

...
Modeling Trust Context in Networks (SpringerBriefs in Computer Science)
Modeling Trust Context in Networks (SpringerBriefs in Computer Science)

We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.  In this brief, "trust context" is defined as the system level...

Cat Owner's Home Veterinary Handbook, Fully Revised and Updated
Cat Owner's Home Veterinary Handbook, Fully Revised and Updated

The classic bestseller--expanded and updated

For years, many veterinary treatments for cats were based on research conducted with dogs because it was wrongly assumed that cats were very similar. Recently, there have been giant strides in feline veterinary research. This classic reference is fully updated and revised to...

Information Technology Security: Advice from Experts (IT Solutions)
Information Technology Security: Advice from Experts (IT Solutions)

As the value of the information portfolio has increased, IT security has changed from a product focus to a business management process. Today, IT security is not just about controlling internal access to data and systems but managing a portfolio of services including wireless networks, cyberterrorism protection and business continuity planning...

No Such Thing as Small Talk: 7 Keys to Understanding German Business Culture
No Such Thing as Small Talk: 7 Keys to Understanding German Business Culture

Many business leaders, when they begin to work overseas or interact professionally with teams abroad, are surprised by how much they thought they knew about the other culture, but how little it counts for on the ground. The reality is that communication is multi-dimensional, and simply knowing a foreign language doesn't mean one...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy