Kirjojen hintavertailu. Mukana 12 390 323 kirjaa ja 12 kauppaa.

Kirjailija

Brett Watson

Kirjat ja teokset yhdessä paikassa: 2 kirjaa, julkaisuja vuosilta 2005-2015, suosituimpien joukossa Bolting Training to Productivity. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

2 kirjaa

Kirjojen julkaisuhaarukka 2005-2015.

Bolting Training to Productivity
This book describes the Industrial Human Performance Process, an application system that merges Human Performance Technology research with successful, industrial-application work practices. The reader will find both a roadmap for identifying and correcting human performance weaknesses, as well as the tools necessary to quantify and measure how training has improved worker performance in the field. Key performance indicators, performance analytics, training tools, in-field observation tools, and methods to reinforce good behaviors in the field are all discussed in this book with several examples of "what does good look like?" This book is a "must have" reference for trainers, supervisors, managers, and human performance specialists whose work is primarily focused in an industrial work environment
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Victor Oppleman; Oliver Friedrichs; Brett Watson

McGraw-Hill Professional
2005
nidottu
Take network security to the next level!This book has never before published advanced security techniques and step-by-step instructions showing how to defend against devastating vulnerabilities to systems and network infrastructure.Just about every day the media is reporting another hard-core hack against some organisation. It was reported mid-March that hackers had taken over one of Lexis Nexis’ databases gaining access to the personal files of as many as 32,000 people. Extreme Exploits provides advanced methodologies and solutions needed to defend against sophisticated exploits by showing them how to use the latest advanced security tools. The book teaches you how little-known vulnerabilities have been successfully exploited in the real world and have wreaked havoc on large-scale networks.