- Table View
- List View
Handbook of Anxiety and Fear (Handbook of Behavioral Neuroscience #Volume 17)
by Robert J. Blanchard, D. Caroline Blanchard, Guy Griebel, David NuttThis Handbook brings together and integrates comprehensively the core approaches to fear and anxiety. Its four sections: Animal models; neural systems; pharmacology; and clinical approaches, provide a range of perspectives that interact to produce new light on these important and sometimes dysfunctional emotions. Fear and anxiety are analyzed as patterns that have evolved on the basis of their adaptive functioning in response to threat. These patterns are stringently selected, providing a close fit with environmental situations and events; they are highly conservative across mammalian species, producing important similarities, along with some systematic differences, in their human expression in comparison to that of nonhuman mammals. These patterns are described, with attention to both adaptive and maladaptive components, and related to new understanding of neuroanatomic, neurotransmitter, and genetic mechanisms. Although chapters in the volume acknowledge important differences in views of fear and anxiety stemming from animal vs. human research, the emphasis of the volume is on a search for an integrated view that will facilitate the use of animal models of anxiety to predict drug response in people; on new technologies that will enable direct evaluation of biological mechanisms in anxiety disorders; and on strengthening the analysis of anxiety disorders as biological phenomena. - Integrates animal and human research on fear and anxiety - Presents emerging and developing fields of human anxiety research including imaging of anxiety disorders, the genetics of anxiety, the pharmacology of anxiolysis, recent developments in classification of anxiety disorders, linking these to animal work - Covers basic research on innate and conditioned responses to threat - Presents work from the major laboratories, on fear learning and extinction - Reviews research on an array of neurotransmitter and neuromodulator systems related to fear and anxiety - Compares models, and neural systems for learned versus unlearned responses to threat - Relates the findings to the study, diagnostics, and treatment of anxiety disorders, the major source of mental illness in modern society (26 % of Americans are affected by anxiety disorders!)
The Analysis of Burned Human Remains (Atlas Of Surgical Pathology Ser.)
by Christopher W. Schmidt Steven A. SymesThis unique reference provides a primary source for osteologists and the medical/legal community for the understanding of burned bone remains in forensic or archaeological contexts. It describes in detail the changes in human bone and soft tissues as a body burns at both the chemical and gross levels and provides an overview of the current procedures in burned bone study. Case studies in forensic and archaeological settings aid those interested in the analysis of burned human bodies, from death scene investigators, to biological anthropologists looking at the recent or ancient dead. - Includes the diagnostic patterning of color changes that give insight to the severity of burning, the positioning of the body, and presence (or absence) of soft tissues during the burning event - Chapters on bones and teeth give step-by-step recommendations for how to study and recognize burned hard tissues
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
by Gene K. Landy Amy J. MastrobattistaThe IT/Digital Legal Companion is a comprehensive business and legal guidance covering intellectual property for digital business; digital contract fundamentals; open source rules and strategies; development, consulting and outsourcing; software as a service; business software licensing, partnering, and distribution; web and Internet agreements; privacy on the Internet; digital multimedia content clearance and distribution; IT standards; video game development and content deals; international distribution; and user-created content, mash-ups, MMOGs, and web widgets.Chapters deal with topics such as copyrights on the Internet, for software protection and around the world; trademarks and domain names; patents and digital technology companies; trade secrets and non-disclosure agreements; confidentiality, rights transfer, and non-competition agreements for employees; introduction to digital product and service contracts; a pragmatic guide to open source; IT services - development, outsourcing, and consulting; beta test agreements; commercial end-user agreements; terms of use for web sites and online applications; privacy and use of personal data; digital technology standards - opportunities, risks, and strategies; content for digital media; and deals in the web and mobile value chains.This book is intended for executives, entrepreneurs, finance and business development officers; technology and engineering officers; marketers, licensing professionals, and technology professionals; in-house counsel; and anyone else that deals with software or digital technology in business.Comprehensive Business and Legal Guidance including* Securing Intellectual Property for Digital Business* Digital Contract Fundamentals* Open Source Rules and Strategies* Development, Consulting and Outsourcing* Software as a Service* Business Software Licensing, Partnering, and Distribution* Web and Internet Agreements* Privacy on the Internet* Digital Multimedia Content Clearance and Distribution* IT Standards* Video Game Development and Content Deals* International Distribution* User-Created Content, Mash-Ups, MMOGs, and Web Widgets* And Much MoreKey Features:* Up-to-the-Moment Legal Guide* In Plain English* Includes 38 Contract and Web Forms in the Book
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
by Johnny LongJohnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology.• Dumpster DivingBe a good sport and don't read the two "D words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny). • TailgatingHackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.• Shoulder SurfingIf you like having a screen on your laptop so you can see what you're working on, don't read this chapter.• Physical SecurityLocks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?• Social Engineering with Jack WilesJack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security. • Google HackingA hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.• P2P HackingLet's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.• People WatchingSkilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye.• KiosksWhat happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?• Vehicle SurveillanceMost people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!
Nmap in the Enterprise: Your Guide to Network Scanning
by Angela Orebaugh Becky PinkardNmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies. - Understand Network Scanning: Master networking and protocol fundamentals, network scanning techniques, common network scanning tools, along with network scanning and policies. - Get Inside Nmap: Use Nmap in the enterprise, secure Nmap, optimize Nmap, and master advanced Nmap scanning techniques. - Install, Configure, and Optimize Nmap: Deploy Nmap on Windows, Linux, Mac OS X, and install from source. - Take Control of Nmap with the Zenmap GUI: Run Zenmap, manage Zenmap scans, build commands with the Zenmap command wizard, manage Zenmap profiles, and manage Zenmap results. - Run Nmap in the Enterprise: Start Nmap scanning, discover hosts, port scan, detecting operating systems, and detect service and application versions - Raise those Fingerprints: Understand the mechanics of Nmap OS fingerprinting, Nmap OS fingerprint scan as an administrative tool, and detect and evade the OS fingerprint scan. - "Tool around with Nmap: Learn about Nmap add-on and helper tools: NDiff--Nmap diff, RNmap--Remote Nmap, Bilbo, Nmap-parser. - Analyze Real-World Nmap Scans: Follow along with the authors to analyze real-world Nmap scans. - Master Advanced Nmap Scanning Techniques: Torque Nmap for TCP scan flags customization, packet fragmentation, IP and MAC address spoofing, adding decoy scan source IP addresses, add random data to sent packets, manipulate time-to-live fields, and send packets with bogus TCP or UDP checksums.
Kismet Hacking
by Frank Thornton Michael J. Schearer Brad HainesKismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. - Wardrive Running Kismet from the BackTrack Live CD - Build and Integrate Drones with your Kismet Server - Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive
Nessus Network Auditing
by Russ RogersThe Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. - Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. - The first edition is still the only book available on the product. - Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.
Visual Thinking for Design
by Colin WareVisual Thinking brings the science of perception to the art of design. Designers increasingly need to present information in ways that aid their audience's thinking process. Fortunately, results from the relatively new science of human visual perception provide valuable guidance. In this book, Colin Ware takes what we now know about perception, cognition, and attention and transforms it into concrete advice that designers can directly apply. He demonstrates how designs can be considered as tools for cognition – extensions of the viewer's brain in much the same way that a hammer is an extension of the user's hand. The book includes hundreds of examples, many in the form of integrated text and full-color diagrams. Experienced professional designers and students alike will learn how to maximize the power of the information tools they design for the people who use them. - Presents visual thinking as a complex process that can be supported in every stage using specific design techniques - Provides practical, task-oriented information for designers and software developers charged with design responsibilities - Includes hundreds of examples, many in the form of integrated text and full-color diagrams - Steeped in the principles of "active vision, which views graphic designs as cognitive tools
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted InformationTM
by Danette McGilvrayInformation is currency. Recent studies show that data quality problems are costing businesses billions of dollars each year, with poor data linked to waste and inefficiency, damaged credibility among customers and suppliers, and an organizational inability to make sound decisions. In this important and timely new book, Danette McGilvray presents her "Ten Steps approach to information quality, a proven method for both understanding and creating information quality in the enterprise. Her trademarked approach—in which she has trained Fortune 500 clients and hundreds of workshop attendees—applies to all types of data and to all types of organizations.* Includes numerous templates, detailed examples, and practical advice for executing every step of the "Ten Steps approach.* Allows for quick reference with an easy-to-use format highlighting key concepts and definitions, important checkpoints, communication activities, and best practices.* A companion Web site includes links to numerous data quality resources, including many of the planning and information-gathering templates featured in the text, quick summaries of key ideas from the Ten Step methodology, and other tools and information available online.
Semantic Web for the Working Ontologist: Effective Modeling in RDFS and OWL
by Dean Allemang James HendlerThe promise of the Semantic Web to provide a universal medium to exchange data information and knowledge has been well publicized. There are many sources too for basic information on the extensions to the WWW that permit content to be expressed in natural language yet used by software agents to easily find, share and integrate information. Until now individuals engaged in creating ontologies-- formal descriptions of the concepts, terms, and relationships within a given knowledge domain-- have had no sources beyond the technical standards documents. Semantic Web for the Working Ontologist transforms this information into the practical knowledge that programmers and subject domain experts need. Authors Allemang and Hendler begin with solutions to the basic problems, but don't stop there: they demonstrate how to develop your own solutions to problems of increasing complexity and ensure that your skills will keep pace with the continued evolution of the Semantic Web.• Provides practical information for all programmers and subject matter experts engaged in modeling data to fit the requirements of the Semantic Web.• De-emphasizes algorithms and proofs, focusing instead on real-world problems, creative solutions, and highly illustrative examples. • Presents detailed, ready-to-apply "recipes for use in many specific situations.• Shows how to create new recipes from RDF, RDFS, and OWL constructs.
DW 2.0: The Architecture for the Next Generation of Data Warehousing
by W. H. Inmon Derek Strauss Genia NeushlossDW 2.0: The Architecture for the Next Generation of Data Warehousing is the first book on the new generation of data warehouse architecture, DW 2.0, by the father of the data warehouse. The book describes the future of data warehousing that is technologically possible today, at both an architectural level and technology level. The perspective of the book is from the top down: looking at the overall architecture and then delving into the issues underlying the components. This allows people who are building or using a data warehouse to see what lies ahead and determine what new technology to buy, how to plan extensions to the data warehouse, what can be salvaged from the current system, and how to justify the expense at the most practical level. This book gives experienced data warehouse professionals everything they need in order to implement the new generation DW 2.0. It is designed for professionals in the IT organization, including data architects, DBAs, systems design and development professionals, as well as data warehouse and knowledge management professionals. - First book on the new generation of data warehouse architecture, DW 2.0 - Written by the "father of the data warehouse", Bill Inmon, a columnist and newsletter editor of The Bill Inmon Channel on the Business Intelligence Network - Long overdue comprehensive coverage of the implementation of technology and tools that enable the new generation of the DW: metadata, temporal data, ETL, unstructured data, and data quality control
Architecture Design for Soft Errors
by Shubu MukherjeeArchitecture Design for Soft Errors provides a comprehensive description of the architectural techniques to tackle the soft error problem. It covers the new methodologies for quantitative analysis of soft errors as well as novel, cost-effective architectural techniques to mitigate them. To provide readers with a better grasp of the broader problem definition and solution space, this book also delves into the physics of soft errors and reviews current circuit and software mitigation techniques. There are a number of different ways this book can be read or used in a course: as a complete course on architecture design for soft errors covering the entire book; a short course on architecture design for soft errors; and as a reference book on classical fault-tolerant machines. This book is recommended for practitioners in semi-conductor industry, researchers and developers in computer architecture, advanced graduate seminar courses on soft errors, and (iv) as a reference book for undergraduate courses in computer architecture. - Helps readers build-in fault tolerance to the billions of microchips produced each year, all of which are subject to soft errors - Shows readers how to quantify their soft error reliability - Provides state-of-the-art techniques to protect against soft errors
Wireless Networking (The Morgan Kaufmann Series in Networking)
by Anurag Kumar D. Manjunath Joy KuriOver the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From cellular mobile telephony to the ubiquitous "WiFi networks in coffee-shops and airports, to the emerging WiMAX wireless broadband access networks, the menu of wireless access systems has become so comprehensive that wireline access to user devices may soon become a relic of the past. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. Rather than provide descriptive accounts of these technologies and standards, the book emphasizes conceptual perspectives on the modeling, analysis, design and optimization of such networks. Furthermore, the authors present wireless networking within the unifying framework of resource allocation, using simple abstractions of the underlying physical wireless communication. In short, Wireless Networking is an in-depth, exhaustive, and invaluable asset to anyone working in this rapidly evolving field. - Goes beyond descriptive and qualitative treatments, by presenting the foundations underlying the various wireless networking technologies - Provides abstractions, models and analyses of established and emerging wireless networks, thereby supplying the reader with a conceptual and quantitative treatment, thus ensuring longevity of the learning from this material - Aids comprehension by including over 120 figures, four appendices on the mathematics of the various models, several inline exercises, and extensive problem sets at the end of each chapter
The Bioarchaeology of Metabolic Bone Disease
by Megan B. Brickley Rachel IvesThe Bioarchaeology of Metabolic Bone Disease provides a comprehensive and invaluable source of information on this important group of diseases. It is an essential guide for those engaged in either basic recording or in-depth research on human remains from archaeological sites. The range of potential tools for investigating metabolic diseases of bone are far greater than for many other conditions, and building on clinical investigations, this book will consider gross, surface features visible using microscopic examination, histological and radiological features of bone, that can be used to help investigate metabolic bone diseases. - Clear photographs and line drawings illustrate gross, histological and radiological features associated with each of the conditions - Covers a range of issues pertinent to the study of metabolic bone disease in archaeological skeletal material, including the problems that frequent co-existence of these conditions in individuals living in the past raises, the preservation of human bone and the impact this has on the ability to suggest a diagnosis of a condition - Includes a range of conditions that can lead to osteopenia and osteoporosis, including previous investigations of these conditions in archaeological bone
Handbook of Heavy Tailed Distributions in Finance: Handbooks in Finance, Book 1 (Handbooks in Finance #Volume 1)
by Svetlozar T. RachevThe Handbooks in Finance are intended to be a definitive source for comprehensive and accessible information in the field of finance. Each individual volume in the series should present an accurate self-contained survey of a sub-field of finance, suitable for use by finance and economics professors and lecturers, professional researchers, graduate students and as a teaching supplement. The goal is to have a broad group of outstanding volumes in various areas of finance. The Handbook of Heavy Tailed Distributions in Finance is the first handbook to be published in this series.This volume presents current research focusing on heavy tailed distributions in finance. The contributions cover methodological issues, i.e., probabilistic, statistical and econometric modelling under non- Gaussian assumptions, as well as the applications of the stable and other non -Gaussian models in finance and risk management.
Digital Electronics and Design with VHDL
by Volnei A. PedroniDigital Electronics and Design with VHDL offers a friendly presentation of the fundamental principles and practices of modern digital design. Unlike any other book in this field, transistor-level implementations are also included, which allow the readers to gain a solid understanding of a circuit's real potential and limitations, and to develop a realistic perspective on the practical design of actual integrated circuits. Coverage includes the largest selection available of digital circuits in all categories (combinational, sequential, logical, or arithmetic); and detailed digital design techniques, with a thorough discussion on state-machine modeling for the analysis and design of complex sequential systems. Key technologies used in modern circuits are also described, including Bipolar, MOS, ROM/RAM, and CPLD/FPGA chips, as well as codes and techniques used in data storage and transmission. Designs are illustrated by means of complete, realistic applications using VHDL, where the complete code, comments, and simulation results are included. This text is ideal for courses in Digital Design, Digital Logic, Digital Electronics, VLSI, and VHDL; and industry practitioners in digital electronics. - Comprehensive coverage of fundamental digital concepts and principles, as well as complete, realistic, industry-standard designs - Many circuits shown with internal details at the transistor-level, as in real integrated circuits - Actual technologies used in state-of-the-art digital circuits presented in conjunction with fundamental concepts and principles - Six chapters dedicated to VHDL-based techniques, with all VHDL-based designs synthesized onto CPLD/FPGA chips
Joe Celko's Thinking in Sets: Auxiliary, Temporal, and Virtual Tables in SQL (The Morgan Kaufmann Series in Data Management Systems)
by Joe CelkoPerfectly intelligent programmers often struggle when forced to work with SQL. Why? Joe Celko believes the problem lies with their procedural programming mindset, which keeps them from taking full advantage of the power of declarative languages. The result is overly complex and inefficient code, not to mention lost productivity.This book will change the way you think about the problems you solve with SQL programs.. Focusing on three key table-based techniques, Celko reveals their power through detailed examples and clear explanations. As you master these techniques, you'll find you are able to conceptualize problems as rooted in sets and solvable through declarative programming. Before long, you'll be coding more quickly, writing more efficient code, and applying the full power of SQL - Filled with the insights of one of the world's leading SQL authorities - noted for his knowledge and his ability to teach what he knows - Focuses on auxiliary tables (for computing functions and other values by joins), temporal tables (for temporal queries, historical data, and audit information), and virtual tables (for improved performance) - Presents clear guidance for selecting and correctly applying the right table technique
Evidence-Based Adjunctive Treatments (Practical Resources for the Mental Health Professional)
by William T. O’Donohue Nicholas A. CummingsAdjunctive treatments, in which patients are provided additional modalities that can assist in their behavior change or the maintenance of their behavior change (i.e. telehealth, psychoeducation, consumer-driven treatment planning), have a useful role in addressing problems that can't be solved by face-to-face meetings. The adjunctive therapies covered in this book are all based on improving patient's self management of their problems or the factors that exacerbate their problems. The book is broadly organized into two sections. The first gives a broad overview of the major adjunctive modalities and the second concentrates on a systematic description of their role in the treatment of a number of special populations while providing practical suggestions for the timing and coordination for the use of the adjunctive therapies discussed in the book.
Doing What Works in Brief Therapy: A Strategic Solution Focused Approach (Practical Resources for the Mental Health Professional)
by Ellen K. QuickDoing What Works in Brief Therapy: A Strategic Solution Focused Approach is both a set of procedures for the therapist and a philosophy– one that is shared with clients and one that guides the work of the therapist. This second edition continues its excellence in offering clinicians a guide to doing what works in brief therapy- for whom, and when and how to use it. Psychotherapy that follows these guidelines validates the client's most important concerns – and it often turns out to be surprisingly brief. Author, Ellen Quick integrates strategic and solution focused therapy and includes guidelines for tailoring technique and interventions to client characteristics and preferences. With clinically rich examples throughout, this book offers applications for couples, including indications for individual or conjoint sessions. - Chapter summaries highlighting key points - Presents ways of eliciting what clients most want to remember - Describes the "Doing What Works Group," including outcome research findings and all materials needed to run the group - Addresses the relationship among the positive psychology movement and this approach and the potential for collaboration - Emphasizes an acceptance-based stance and how acceptance commonly leads to change - Proposes that "doing what works and changing what doesn't" can provide a transtheoretical perspective for therapists of any orientation
Sarbanes-Oxley IT Compliance Using Open Source Tools
by Christian B Lahti Roderick PetersonThe Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal securities laws in the United States since the New Deal. It came in the wake of a series of corporate financial scandals, including those affecting Enron, Arthur Andersen, and WorldCom. The law is named after Senator Paul Sarbanes and Representative Michael G. Oxley. It was approved by the House by a vote of 423-3 and by the Senate 99-0. This book illustrates the many Open Source cost-saving opportunities that public companies can explore in their IT enterprise to meet mandatory compliance requirements of the Sarbanes-Oxley act. This book will also demonstrate by example and technical reference both the infrastructure components for Open Source that can be made compliant, and the Open Source tools that can aid in the journey of compliance. Although many books and reference material have been authored on the financial and business side of Sox compliance, very little material is available that directly address the information technology considerations, even less so on how Open Source fits into that discussion. The format of the book will begin each chapter with the IT business and executive considerations of Open Source and SOX compliance. The remaining chapter verbiage will include specific examinations of Open Source applications and tools which relate to the given subject matter. * Only book that shows companies how to use Open Source tools to achieve SOX compliance, which dramatically lowers the cost of using proprietary, commercial applications. * Only SOX compliance book specifically detailing steps to achieve SOX compliance for IT Professionals.
CNS Regeneration: Basic Science and Clinical Advances
by Jeffrey H. Kordower Mark H. TuszynskiThis second edition of CNS Regeneration updates the burgeoning field of regeneration in the Central Nervous System (CNS) from molecular, systems, and disease-based perspective. While the book covers numerous areas in detail, special emphasis is given to discussions of movement disorders such as Parkinson's disease, Alzheimer's disease, and spinal cord injury. - Incorporates information gained from cutting-edge photomicroscopy techniques - Includes current information on clinical trials - Presents chapters on stem cells and other novel treatments for diseases of the CNS
The Best Damn Exchange, SQL and IIS Book Period
by Henrik Walther Mark Horninger Chris AdamsExchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support "anywhere access" present IT professionals with a steep learning curve. Making certain that these products are configured to meet regulatory compliance requirements adds addtionaly complexity to day-to-day management network management. The Best Damn Exchange, SQL and IIS Book Period delivers an all-in-one reference for Windows System Administrators deploying the 2007 releases of these core Microsoft servers. The coverage is comprehensive, and provides users with just about everything they need to manage a Windows enterprise server. Special Bonus coverage includes how to gather and analyze the many log files generated by these servers. - All-in-one coverage includes Exchange, SQL, and IIS Servers - Integrated coverage on all key security features - Bonus coverage includes analyzing server logs and integrating Communicator 2007
Product Experience
by Hendrik N.J. Schifferstein Paul HekkertProduct Experience brings together research that investigates how people experience products: durable, non-durable, or virtual. In contrast to other books, the present book takes a very broad, possibly all-inclusive perspective, on how people experience products. It thereby bridges gaps between several areas within psychology (e.g. perception, cognition, emotion) and links these areas to more applied areas of science, such as product design, human-computer interaction and marketing. The field of product experience research will include some of the research from four areas: Arts, Ergonomics, Technology, and Marketing. Traditionally, each of these four fields seems to have a natural emphasis on the human (ergonomics and marketing), the product (technology) or the experience (arts). However, to fully understand human product experience, we need to use different approaches and we need to build bridges between these various fields of expertise. - Most comprehensive collection of psychological research behind product design and usability - Consistenly addresses the 3 components of human-product experience: the human, the product, and the experience - International contributions from experts in the field
Ocular Therapeutics: Eye on New Discoveries
by Thomas Yorio Abbot F. Clark Martin B. WaxOcular Therapeutics: Eye on New Discovery focuses on emerging areas in ocular research, from new approaches to dry eye to gene therapy in the management of retinal diseases. This comprehensive book features more than 25 chapters of information that will be vital for ocular investigators and ophthalmologists bringing them new information on promising therapeutics. It is the intent of this book to provide not only information on current approaches to treatment, but also in giving the reader a greater understanding as to what may become available for treating a number of important eye diseases. Each chapter features some new aspect of treatment that holds great promise for the future. The approach has been to concentrate on those areas of ocular diseases that are more prevalent. It also features new insight for drug delivery and for managing devasting diseases, such as macula edema and glaucoma, two of the leading causes of blindness in the United States. This book will serve as an important resource as it contains a number of relevant references highlighted for their importance to the field. New investigators will be able to obtain an historical perspective for each of the topics and to develop an understanding of the new research directions that are underway. Ocular Therapeutics: Eye on New Discovery is more than a reference book, as it also provides an important glimpse into the near future.* Contains information that is vital for ocular investigators and ophthalmologists bringing them new information on promising therapeutics.* Provides not only information on current approaches to treatment, but also gives the reader a greater understanding as to what may become available for treating a number of important eye diseases.* Historical perspective for each of the topics as well as an important glimpse into the near future to develop an understanding of the new research directions underway.* New insight for drug delivery and for managing devastating diseases, such as macula edema and glaucoma, two of the leading causes of blindness in the United States
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
by Rob Cameron Neil R. WylerJuniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform. - Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP. - Learn to scale your appliances to meet the demands of remote workers and offices. - Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.