School Security: How to Build and Strengthen a School Safety Program, Second Edition emphasizes a proactive rather than reactive approach to school security.
Although some people had doubts about the usefulness of such solutions in the past, artificial intelligence (AI) plays a growing role in modern business.
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools.
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures.
Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach.
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information.
A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment.
This volume brings together for the first time the diverse threads within the growing field of serendipity research, to reflect both on the origins of this emerging field within different disciplines as well as its increasing influence as its own field with foundational texts and emerging practices.
In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability.
Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing the best possible security while saving millions in improved operations efficiency.
Multistate System Reliability with Dependencies explains how to select a model of load sharing that best describes the impact of changes in reliability states of components.
Volume 9: Historical Perspectives, Part B: Notable People in Mass Spectrometry of The Encyclopedia of Mass Spectrometry briefly reviews the lives and works of many of the major people who carried out this development, providing insights into the history of mass spectrometry applications through the personal stories of pioneers and innovators in the field.
Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers.
In today's competitive global economy, a firm's market position and bottom-line financial performance is closely linked to its supply chain performance.
Become a master consultant using the training program created and used by OracleThe Oracle Consulting Way provides the essential tools and people skills a consultant must have to build trusted client relationships that lead to long-term business.
One of the world's foremost experts on the topic of the future of work and human capital, Lynda Gratton argues that global corporations can be major players in changing the world, with their massive networks of human resources, varieties of expertise, and vast organizational skills.
The New York Times and USA Today bestseller-updated to bring you up to speed on the latest social media sites, features, and strategiesFrom one of the world's leading figures in social media marketing, networking, and business applications comes the heavily revised and updated edition of the Likeable Social Media.
Cutting-edge Lean manufacturing strategiesThoroughly updated with the latest trends and new global case studies, How to Implement Lean Manufacturing, Second Edition, explains how to implement this powerful formula for eliminating waste, controlling quality and inventory, and improving overall performance across an enterprise environment.
In a time defined by accelerating complexity, where technological breakthroughs-from artificial intelligence to blockchain to the emerging contours of Industry 5.
In a time defined by accelerating complexity, where technological breakthroughs-from artificial intelligence to blockchain to the emerging contours of Industry 5.
Artificial Intelligence (AI) is transforming the field of Knowledge Management (KM); as AI technologies rapidly evolve and permeate organisational processes, there is an urgent need for a fresh, critical examination of their impact on knowledge creation, sharing, and utilisation.
Artificial Intelligence (AI) is transforming the field of Knowledge Management (KM); as AI technologies rapidly evolve and permeate organisational processes, there is an urgent need for a fresh, critical examination of their impact on knowledge creation, sharing, and utilisation.