|
A technical guide to IPSec virtual private networks
|
Jim S. Tiller |
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impres… |
OL13576594W |
|
Public Key Infrastructure
|
John R Vacca |
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Infor… |
OL15172981W |
|
Dangerous schools
|
Irwin A. Hyman |
"In this expose of institutional abuse, Irwin Hyman and Pamela Snook uncover officially authorized violence that far exceeds the number of offenses committed by students. These little researched, fre… |
OL15835637W |
|
Prudent practices in the laboratory
|
National Research Council (U.S.). Committee on Prudent Practices in the Laboratory |
Prudent Practices in the Laboratory--the book that has served for decades as the standard for chemical laboratory safety practice--now features updates and new topics. This revised edition has an exp… |
OL19897686W |
|
100 fiches pratiques
|
Stéphane Bernier |
Des fiches simplifiées sur une centaine de produits utilisés couramment en laboratoire, présentant toutes les informations utiles à leur manipulation et à leur stockage (toxicité, incompatibilité, pr… |
OL19901138W |
|
Foolproof
|
Greg Ip |
"We have learned a staggering amount about human nature and disaster -- yet we keep having car crashes, floods, and financial crises. Partly this is because the success we have at making life safer e… |
OL20010546W |
|
Frisson l'écureuil se prépare pour Noël
|
Mélanie Watt |
Nouvel opus d'une charmante série relatant les aventures de Frisson, un écureuil que ses folles aventures amènent à se guérir peu à peu de ses peurs maladives. L'attachant petit rongeur rassemble dan… |
OL27695848W |
|
Safety and risk in primary school physical education
|
John Severs |
Physical education and sport in schools is undergoing renewed emphasis and the primary sector key stages are rightly seen as fundamental elements in the new initiatives.The majority of primary school… |
OL5960053W |
|
Emergency action for chemical and biological warfare agents
|
D. Hank Ellison |
A HazMat team evacuates five square miles of a city business district in response to a chemical spill. Ten city blocks away, a police special response team forms a perimeter around an office building… |
OL8636147W |
|
A Practical Guide to Security Assessments
|
Sudhanshu Kairab |
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mi… |
OL8636700W |
|
Building an effective information security policy architecture
|
Sandy Bacik |
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards … |
OL9767255W |
|
Multimedia Content Encryption
|
Shiguo Lian |
"The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. I… |
OL9767344W |