Der lange Weg nach Alice Springs (A Town Like Alic | Linda Hart | There's… Johnny!
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Calculus: A Complete Course
Calculus: A Complete Course

Adams Calculus is intended for the three semester calculus course. Classroom proven in North America and abroad, this classic text has been praised for its high level of mathematical integrity including complete and precise statements of theorems, use of geometric reasoning in applied problems, and the diverse range of applications across the...

Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

Object-Oriented Design Heuristics
Object-Oriented Design Heuristics
Upon completion of an object-oriented design, you are faced with a troubling question: "Is it good, bad, or somewhere in between?" Seasoned experts often answer this question by subjecting the design to a subconscious list of guidelines based on their years of experience. Experienced developer Arthur J. Riel has captured this elusive,...
Refactoring Databases : Evolutionary Database Design
Refactoring Databases : Evolutionary Database Design

Refactoring has proven its value in a wide range of development projectshelping software professionals improve system designs, maintainability, extensibility, and performance. Now, for the first time, leading agile methodologist Scott Ambler and renowned consultant Pramodkumar Sadalage introduce powerful refactoring techniques...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Practical Wisdom: The Right Way to Do the Right Thing
Practical Wisdom: The Right Way to Do the Right Thing

A reasoned and urgent call to embrace and protect the essential human quality that has been drummed out of our lives: wisdom.

In their provocative new book, Barry Schwartz and Kenneth Sharpe explore the insights essential to leading satisfying lives. Encouraging individuals to focus on their own personal intelligence and...

Active Directory Cookbook
Active Directory Cookbook

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service.

...

Diagnosis and Treatment of Radiation Injuries (Safety Report, Iaea Comprehensive No Inis Ser. Series, 8000)
Diagnosis and Treatment of Radiation Injuries (Safety Report, Iaea Comprehensive No Inis Ser. Series, 8000)
According to the International Basic Safety Standards an accident is “any unintended event, including operating errors, equipment failures or other mishaps, the consequences or potential consequences of which are not negligible from the point of view of protection or safety” [1].

A radiological accident
...
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Global Positioning Systems, Inertial Navigation, and Integration
Global Positioning Systems, Inertial Navigation, and Integration

An updated guide to GNSS and INS, and solutions to real-world GPS/INS problems with Kalman filtering

Written by recognized authorities in the field, this second edition of a landmark work provides engineers, computer scientists, and others with a working familiarity with the theory and contemporary...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy