Account
Orders
Advanced search
Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people. The book merges business and security perspectives to help transform this often conflicted...
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and...
Building on the foundation of the previous five editions, Hospital and Healthcare Security, 6th Edition includes new and updated chapters to reflect the current state of healthcare security, particularly in data security and patient privacy, patient-generated violence,...
It seems that every day there's a new story about a security lapse, emergency lock-down, or violent act taking place at a school somewhere in the United States. Today it's simply inexcusable not to have adequate security measures in place—regardless of how safe you...
School security is one of the most pressing public concerns today. Yet in most schools, there is little security expertise or detailed knowledge about how to implement and manage a security program. The Handbook forSchool Safety and Security rectifies this problem by...
Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an...
Telecommunications Engineer's Reference Book maintains a balance between developments and established technology in telecommunications. This book consists of four parts. Part 1 introduces mathematical techniques that are required for the analysis of telecommunication...
RETAIL SECURITY AND LOSS PREVENTION is an invaluable reference for both retail and security professionals. Using step-by-step plans, this book helps the reader design and implement cost-effective loss control programs.It details an easy-to-follow proven process.
Tourism security is an important part of both security management and tourism. Private security professionals and police departments in tourism cities, as well as hotels, major attractions, and theme parks, have all come to realize that tourism security and safety...
This valuable tool for the security manager will assist in tailoring surveys specifically for computer security. The Ultimate Computer Security Survey will allow security managers to take one of the most time-consuming and difficult areas of security -vulnerability...
Personal Social Services serves as a comprehensive source of statistical data for any researcher, be they students or professional. The text opens with a definition of children's services, health and welfare services. It describes and discusses local authority personal...
Learning to Hear provides an introduction to the best methods of early detection of deafness. This book discusses the approach to the problems of congenital deafness. Organized into nine chapters, this book begins with an overview of the anatomy, physiology, and...
The Software Life Cycle deals with the software lifecycle, that is, what exactly happens when software is developed. Topics covered include aspects of software engineering, structured techniques of software development, and software project management.The use of...
The Adolescent: An Educational Perspective covers several aspects of adolescent's development. The book discusses an adolescent's physical, cognitive, affective, social, conative, and normative development, together with an overview of pedagogic implications.The text...
Europe-Japan: Futures in Science, Technology and Democracy presents the combined European and Japanese thinking on the implications of scientific and technological developments for society and democracy. This book addresses the challenges and the advantages that science...
Aging and Ethnicity: Toward an Interface provides a framework for comparison in aging and ethnicity. This book examines the ethnic factor and its importance for the study of the elderly.Organized into five chapters, this book begins with an overview of the general...
Protecting Historic Architecture and Museum Collections from Natural Disasters serves as a useful guide for professionals engaged in the preservation of cultural heritage, whether structures or artifacts. This book discusses how to prevent losses to the cultural...
Woman: An Historical Gynælogical and Anthropological Compendium, Volume Three provides information pertinent to the obstruction in the normal process of labor. This book discusses the various ways and treatment, the obligations and duties of women among the different...
Woman: An Historical Gynælogical and Anthropological Compendium, Volume Two provides information pertinent to relationships of women to the male sex. This book discusses the concepts of modesty, chastity, and respects for women in cultural history. Organized into 39...
Mendelian Inheritance in Man: Catalogs of Autosomal Dominant, Autosomal Recessives, and X-Linked Phenotypes presents catalogs in connection with the genetics of the X chromosome. This book provides a catalog of dominant phenotypes and covers other entries, including...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers