|
|
Showing 1 - 25 of
218 matches in All Departments
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
CORPORATE CYBERSECURITY An insider's guide showing companies how to
spot and remedy vulnerabilities in their security programs A bug
bounty program is offered by organizations for people to receive
recognition and compensation for reporting bugs, especially those
pertaining to security exploits and vulnerabilities. Corporate
Cybersecurity gives cyber and application security engineers (who
may have little or no experience with a bounty program) a hands-on
guide for creating or managing an effective bug bounty program.
Written by a cyber security expert, the book is filled with the
information, guidelines, and tools that engineers can adopt to
sharpen their skills and become knowledgeable in researching,
configuring, and managing bug bounty programs. This book addresses
the technical aspect of tooling and managing a bug bounty program
and discusses common issues that engineers may run into on a daily
basis. The author includes information on the often-overlooked
communication and follow-through approaches of effective
management. Corporate Cybersecurity provides a much-needed resource
on how companies identify and solve weaknesses in their security
program. This important book: Contains a much-needed guide aimed at
cyber and application security engineers Presents a unique
defensive guide for understanding and resolving security
vulnerabilities Encourages research, configuring, and managing
programs from the corporate perspective Topics covered include bug
bounty overview; program set-up; vulnerability reports and
disclosure; development and application Security Collaboration;
understanding safe harbor and SLA Written for professionals working
in the application and cyber security arena, Corporate
Cybersecurity offers a comprehensive resource for building and
maintaining an effective bug bounty program.
You're about to discover the fundamentals of obedience training,
crate training and potty training. There are outlined pointers that
will introduce you to the very essence of training your puppy. In
addition, the guidelines that you will find within this book will
enable you to have full control over your puppy through proper
commands. This will also teach you how to properly motivate your
puppy in times of accidents and discouragement. In this book, only
the most efficient, effective, and stress-free strategies are given
in order to give the reader the best value for his money. As such,
it is only fitting that only the major issues and problems that may
arise as a result of obedience, crate, and potty training are
thoroughly discussed. By consistently practicing the strategies
outlined in this book, I am very confident that you will be able to
properly train your puppy without putting it into unnecessary
stress and suffering.
|
American Tricksters (Hardcover)
William J. Jackson; Foreword by Peter Thuesen
|
R1,213
R1,017
Discovery Miles 10 170
Save R196 (16%)
|
Ships in 18 - 22 working days
|
Topics Covered...Dog Training Preparation Basic Dog Training
Principles Obedience Training Crate Training Potty Training Clicker
Training Training Your Dog Not to Bite Training Your Dog to
Socialize Stop Destructive Behaviors "Leave It" Command Training
Much, much more!
This new edition presents information and knowledge on the field of
biomedical devices and surgical tools. The authors look at the
interactions between nanotechnology, nanomaterials, design,
modeling, and tools for surgical and dental applications, as well
as how nanostructured surfaces can be created for the purposes of
improving cell adhesion between medical devices and the human body.
Each original chapter is revised in this second edition and
describes developments in coatings for heart valves, stents, hip
and knee joints, cardiovascular devices, orthodontic applications,
and regenerative materials such as bone substitutes. There are also
8 new chapters that address: Microvascular anastomoses Inhaler
devices used for pulmonary delivery of medical aerosols Surface
modification of interference screws Biomechanics of the mandible (a
detailed case study) Safety and medical devices The synthesis of
nanostructured material Delivery of anticancer molecules using
carbon nanotubes Nano and micro coatings for medical devices This
book is appropriate for engineers, material scientists, chemists,
physicists, biologists, medical and dental professionals with an
interest in biomedical devices and tools, and researchers in the
same fields.
For soldiers who want to increase their professional knowledge of
the Army and prepare themselves for promotion boards, this revised
and expanded edition of the Soldier's Study Guide contains more
than 1,460 questions in 58 subject areas. The questions cover Army
programs, basic combat skills, combat stress, leadership,
maintenance of equipment, customs and courtesies, justice, physical
training, NBC warfare, uniforms and insignia, weapons, and more . *
For soldiers who want to increase their professional knowledge of
the Army and prepare themselves for promotion boards * Covers army
programs, basic combat skills, combat stress, leadership,
maintenance of equipment, customs and courtesies, justice, physical
training, NBC warfare, uniforms and insignia, weapons, and more *
More than 100,000 sold
Uranium Processing and Properties describes developments in uranium
science, engineering and processing and covers a broad spectrum of
topics and applications in which these technologies are harnessed.
This book offers the most up-to-date knowledge on emerging nuclear
technologies and applications while also covering new and
established practices for working with uranium supplies. The book
also aims to provide insights into current research and processing
technology developments in order to stimulate and motivate
innovation among readers. Topics covered include casting
technology, plate and sheet rolling, machining of uranium and
uranium alloys, forming and fabrication techniques, corrosion
kinetics, nondestructive evaluation and thermal modeling.
|
Ventura (Paperback)
Glenda J Jackson
|
R565
R519
Discovery Miles 5 190
Save R46 (8%)
|
Ships in 18 - 22 working days
|
Franciscan monk Fr. Junipero Serra, founder of the Spanish mission
system in California, raised a cross on the beach on March 31,
1782, at a spot that became a general wayfarer's midpoint between
Los Angeles and Point Conception. This was the dedication of
Mission San Buenaventura. Bordered by rivers out of the foothills,
this coastal area had originally been home to many Chumash Indian
villages, dating back to 1000 A.D. The small mission outpost
quickly flourished and eventually grew into a town complete with
dirt streets, wooden sidewalks, saloons, churches, and various
adventures and calamities. On March 10, 1866, the "City of Good
Fortune" incorporated and received one of the first charters from
the then 16-year-old, 31st state in the union. Today the city of
Ventura bustles with more than 110,000 residents and is known as
the "Gateway to the Channel Islands."
The writers examine how the eastward movement of NATO has led to a
new organization. As they point out, the process was underway by
the time the Soviet Union collapsed. Issues of western financial
constraint, the Gulf War, events in the former Yugoslavia, and
changing configurations of the major NATO partners led the way. In
addition, the essays examine the potential effects of the
incorporation of Poland, the Czech Republic, and Hungary as well as
the more distant, but still conceivable inclusion of the Baltic
states, Ukraine, and others and special arrangements with Russia.
NATO is leading the way in creating a new security architecture for
Europe and its look East policy is the most important part of the
change. As the essays indicate, NATO's transformation leaves many
questions for the future. Despite the new Russian-NATO agreement,
what reactions will take place in Rusian domestic politics? What
will happen in the ratification process throughout the extant
member states? Can all 16 states come to a unanimous agreement? And
lastly what will be the consequences for Eastern Europe: including
the new members of Poland, Hungary, and the Czech Republic, and
possibly and more importantly, those states inside the former
communist empire which are not admitted as members in the first
round of expansion? This is an important study for scholars,
researchers, and policy makers involved with Eastern Europe and
NATO.
|
Selma (Hardcover)
Sharon J. Jackson
|
R719
R638
Discovery Miles 6 380
Save R81 (11%)
|
Ships in 18 - 22 working days
|
|
Ventura (Hardcover)
Glenda J Jackson
|
R719
R638
Discovery Miles 6 380
Save R81 (11%)
|
Ships in 18 - 22 working days
|
This volume draws together and analyzes the changing conditions
in Europe since the momentous events of 1989 when the Berlin Wall
fell and a historic wave of change gathered force in Eastern Europe
and the Soviet Union. The dissolution of the Warsaw Pact, the
attempted coup d'etat against Gorbachev, and violence in Yugoslavia
are only a few of the events that have shaken the foundations of
European and international affairs. The studies included provide
insights on the most important aspects of European security,
including military, economic and political issues, and also assess
both North American and European perspectives about contemporary
events and future scenarios.
These studies address the immensely topical subjects of the
future of the economic community, the use or misuse of the
Conference on Security and Co-operation in Europe, and the
possibilities for war and for peace in our time. Part I provides an
overview of the new Europe. This volume will be useful to students
of European politics and security and to students and specialists
concerned with the future of Europe.
|
|