Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Maximum Influence: The 12 Universal Laws of Power Persuasion
Maximum Influence: The 12 Universal Laws of Power Persuasion

Do you realize how much your professional success, your personal relationships, your leadership potential, and your income depend on your ability to persuade, influence, and motivate other people? Whatever you want to achieve, Maximum Influence will help make it happen. Persuasion expert Kurt Mortensen has combined years of scientific...

The Inner Game of Stress: Outsmart Life's Challenges and Fulfill Your Potential
The Inner Game of Stress: Outsmart Life's Challenges and Fulfill Your Potential

Renowned sports psychology expert W. Timothy Gallwey teams up with two esteemed physicians to offer a unique and empowering guide to mental health in today’s volatile world. The Inner Game of Stress applies the trusted principles of Gallwey’s wildly popular Inner Game series, which have helped athletes the world over, to...

Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Sales Hunting: How to Develop New Territories and Major Accounts in Half the Time  Using Trust as Your Weapon
Sales Hunting: How to Develop New Territories and Major Accounts in Half the Time Using Trust as Your Weapon

The first year of developing a new sales territory is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on product, grab a customer list, start calling for appointments, discover opportunities, and close deals. In fact, almost every sales model out there is based on nothing more than...

Making up the Mind: How the Brain Creates Our Mental World
Making up the Mind: How the Brain Creates Our Mental World
Inside your head there is an amazing labor-saving device; more effective than the latest high-tech computer. Your brain frees you from the everyday tasks of moving about in the world around you, allowing you to concentrate on the things that are important to you: making friends and influencing people. However, the ‘you’ that is released...
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010

The present volume contains the proceedings of the seventh international workshop on Formal Aspects of Security and Trust (FAST 2010), held in Pisa, Italy, 16–17 September 2010, as part of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010).

FAST aims to foster cooperation among...

Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009
Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale...

Reliable Knowledge Discovery
Reliable Knowledge Discovery
With the rapid development of the data mining and knowledge discovery, a key issue which could significantly affect the real world applications of data mining is the reliability issues of knowledge discovery. It is natural that people will ask if the discovered knowledge is reliable. Why do we trust the discovered knowledge? How...
Lonely Planet Papua New Guinea & Solomon Islands (Country Guide)
Lonely Planet Papua New Guinea & Solomon Islands (Country Guide)

“Rainforest-covered mountains, coral-fringed islands, heady Highland festivals…Papua New Guinea and the Solomon Islands set the stage for unforgettable adventures.” REGIS ST. LOUIS, LONELY PLANET WRITER

Our Promise
You can trust our travel information because Lonely Planet authors visit the
...

How: Why How We Do Anything Means Everything...in Business (and in Life)
How: Why How We Do Anything Means Everything...in Business (and in Life)
The flood of information and unprecedented transparency reshaping today's business world has dramatically changed the rules of the game. It's no longer what you do that sets you apart from others, but how you do what you do. Whats are commodities, easily duplicated or reverse-engineered. Sustainable advantage and enduring success—for both...
Deafness and Challenging Behaviour: The 360° Perspective
Deafness and Challenging Behaviour: The 360° Perspective

Challenging behaviours, such as aggression and violence, are more common in deaf people than hearing people. Filling a crucial gap in the international market, this book will appeal equally to those who work occasionally or entirely with Deaf or hearing impaired client groups of all ages.

Multi-disciplinary professionals with...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy