• Identity and Data Security for Web Development: Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working...

    • ASIN: 1491937017
    • Brand: O'Reilly Media

  • Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones

    The instant New York Times bestsellerTiny Changes, Remarkable ResultsNo matter your goals, Atomic Habits offers a proven framework for improving--every day. James Clear, one of the world's leading experts on habit formation, reveals practical strategies that will teach you exactly how to form good habits, break bad ones, and master the tiny behavio...

    • ASIN: B07D23CFGR

  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

    Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in o...

    • ASIN: 0131463071

  • Focus on IAM (Identity and Access Management): CSFs, metrics, checklists, best practices, and guidelines for defining IAM processes and implementing IAM solutions

    This is the 2016 Edition of Focus on IAM (Identity and Access Management), a very unique book addressing all the facets of IAM. It is written for all IAM and Information security professionals in IT. This book is not focused on any specific IAM tool/ product; it will provide the deep delving information on Identity and Access Management with resp...

    • ASIN: 0991320530

  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management (Sun Core Series)

    Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in o...

    • ASIN: 0133119769
    • Brand: Brand: Prentice Hall

  • The Sacred Enneagram: Finding Your Unique Path to Spiritual Growth

    As featured in the Fall 2018 edition of The Magnolia Journal and on the Rise Together podcast with Dave and Rachel Hollis, For the Love podcast with Jen Hatmaker, Typology podcast with Ian Morgan Cron, and Sleeping At Last podcast with Ryan O'Neal.How to understand the 'why' behind your enneagram type.Chris Heuertz’ life was forever ch...

    • ASIN: B01N0CSDNX
    • Brand: Zondervan

  • Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

    Organizations of all kinds are recognizing the crucial importance of protecting privacy. Their customers, employees, and other stakeholders demand it. Today, failures to safeguard privacy can destroy organizational reputations — and even the organizations themselves. But implementing effective privacy protection is difficult, and there are few co...

    • ASIN: 0135302153

  • The Culture Code: The Secrets of Highly Successful Groups

    NEW YORK TIMES BESTSELLER • The author of The Talent Code unlocks the secrets of highly successful groups and provides tomorrow’s leaders with the tools to build a cohesive, motivated culture.NAMED ONE OF THE BEST BOOKS OF THE YEAR BY BLOOMBERG AND LIBRARY JOURNAL Where does great culture come from? How do you build and sustain it in your gr...

    • ASIN: B01MSY1Y6Z

  • Microsoft Azure Security Infrastructure (IT Best Practices - Microsoft Press)

    Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrat...

    • ASIN: 150930357X

  • Clinical Management of Gender Identity Disorders in Children and Adults (Clinical Practice)

    Signs of cross-gender identification have been observed in children as young as three years of age, and trans-sexualism has been diagnosed, at the opposite extreme, in eventually reasigned individuals, whose first clinical evaluation came in their 60s. Gender dysphoria occurs in females as well as males, and gender identity disorders - although pro...

    • ASIN: 0880481870

  • Awaken the Giant Within: How to Take Immediate Control of Your Mental, Emotional, Physical and Financial


    • ASIN: B001EM101Q

  • Building Secure and Reliable Systems: SRE and Security Best Practices

    Can a system ever truly be considered reliable if it isn't fundamentally secure? In two previous O'Reilly books, experts from Google showed how reliability is fundamental to service design. Site Reliability Engineering and The Site Reliability Workbook demonstrated how and why a commitment to the entire service lifecycle enables organizations to su...

    • ASIN: 1492083127

  • Organizational Identity in Practice

    Organizational Identity in Practice provides much-needed, in-depth studies on what happens when  aspirations, claims and beliefs interact. Given the practical needs of managers and students, this exciting new text provides readers with more insight into what differences in these identity aspirations, claims and beliefs really mean and what we may ...

    • ASIN: 0415398401
    • Brand: Brand: Routledge

  • Serverless Design Patterns and Best Practices: Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity

    Get started with designing your serverless application using optimum design patterns and industry standard practicesKey FeaturesLearn the details of popular software patterns and how they are applied to serverless applicationsUnderstand key concepts and components in serverless designsWalk away with a thorough understanding of architecting serverle...

    • ASIN: B0773M31S5

  • Eleventh Hour CISSP®: Study Guide

    Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely...

    • ASIN: B01LNFMIU0

  • Focus on Iam (Identity and Access Management) : Csfs, Metrics, Checklists, Best Practices, and Guidelines for Defining Iam Processes and Implementing Iam Solutions

    Focus on IAM (Identity and Access Management) is a very unique book addressing all the facets of IAM. It is written for all IAM and Information security professionals in IT. This book is not focused

    • UPC: 855883938

  • Web Content Management : Systems, Features, and Best Practices

    "Looking to select a web content management system (CMS), but confused about the promises, terminology, and buzzwords? Do you want to understand content management without having to dive into the underlying programming? This book provides

    • UPC: 44979023

  • Best Practices: Time Management - eBook

    There are only twenty-four hours in a day, but you can make them count. Time Management, a comprehensive and essential resource for any manager on the run, shows you how.Learn to:Set and prioritize goals, objectives,

    • UPC: 449836318

  • Methadone Maintenance Treatment : Best Practices in Case Management

    Clients talk about working with case managers: "They stick with me through thick and thin, no matter how much I'm using. They don't give up on me." "[People need] help with lots of things: legal

    • UPC: 53373317

  • Anger Management Best Practice Handbook: Controlling Anger Before it Controls You, Proven Techniques and Exercises for Anger Management - Second Edition - eBook

    Get Rid Of Anger Fast, Don't let anger control your life and Stop hurting the ones you love. A huge revision from the First Edition, which is a bestseller, with lots of extra chapters such

    • UPC: 161038829

  • Compendium of Best Practices in Road Asset Management - eBook

    The objective of road asset management is generally to optimize economic benefits by minimizing maintenance costs and road user costs. This compendium presents the best practices for the introduction and development of road asset management

    • UPC: 403294041

  • Open Source Identity Management Patterns and Practices Using OpenAM 10.x - eBook

    This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x. Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects

    • UPC: 219815177

  • Anger Management Best Practice Handbook: Controlling Anger Before it Controls You, Anger Management Proven Techniques and Excercises - eBook

    This book covers all the Methods of Anger Management for a balanced approach to managing anger, which both controls the emotion and allows the emotion to express itself in a healthy way. Some descriptions of

    • UPC: 642070309

  • Best Classroom Management Practices for Reaching All Learners - eBook

    This collection of advice from expert teachers brings together the best of classroom management by compiling suggestions, tactics, and plans for improving classroom management

    • UPC: 323169352

  • Project Management Essentials : A Quick and Easy Guide to the Most Important Concepts and Best Practices for Managing Your Projects Right

    If you're new to project management or need to refresh your knowledge, Project Management Essentials, Third Edition is the quickest and easiest way to learn how to manage projects successfully. The concepts presented are not

    • UPC: 22897612

  • Hybrid identity and access management best practices - BRK3243

    Best practices for Identity and Access Management on Compute Engine (Google Cloud Next '17)

    Azure Security and Identity Management Best Practices