|
|
|
|
|
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.
Overview
-
Learn how mobile devices are monitored and the impact of cloud computing
... | | Practice of Geriatrics, 4e
The geriatric population is expected to double by 2020. The new fourth edition of Practice of Geriatrics will equip you with the knowledge you need to provide effective care for this growing patient population. With revised and up-to-date content throughout, this essential reference will keep you abreast of the latest clinical protocols and... | | Behavioral Medicine: A Guide for Clinical Practice, Third Edition
5 STAR DOODY'S REVIEW!
"This is an extraordinarily thorough, useful book. It manages to summarize numerous topics, many of which are not a part of a traditional medical curriculum, in concise, relevant chapters. Physicians who do not understand the dynamics behind the doctor-patient relationship usually end up being... |
|
| | Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing... | | Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of... |
|
|
|
Result Page: 1258 1257 1256 1255 1254 1253 1252 1251 1250 1249 1248 1247 1246 1245 1244 1243 1242 1241 1240 |