• Identity and Data Security for Web Development: Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone working on a system needs to ensure that users and data are protected.Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity... [Read More]

    • ASIN: 1491937017
    • ASIN: 1491937017
    • ISBN: 1491937017
    • Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones

    The instant New York Times bestsellerTiny Changes, Remarkable ResultsNo matter your goals, Atomic Habits offers a proven framework for improving--every day. James Clear, one of the world's leading experts on habit formation, reveals practical strategies that will teach you exactly how to form good habits, break bad ones, and master the tiny behaviors that lead to remarkable results.If you're having trouble changing your habits, the problem isn't you. The problem is your system. Bad habits repeat themselves again and again not because you don't want to change, but because you have the wrong sys... [Read More]

    • ASIN: B07D23CFGR
    • ASIN: B07D23CFGR
    • Manufacturer: Avery

  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

    Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive ... [Read More]

    • ASIN: 0131463071
    • ASIN: 0131463071
    • ISBN: 0131463071
    • Manufacturer: Prentice Hall

  • Focus on IAM (Identity and Access Management): CSFs, metrics, checklists, best practices, and guidelines for defining IAM processes and implementing IAM solutions

    This is the 2016 Edition of Focus on IAM (Identity and Access Management), a very unique book addressing all the facets of IAM. It is written for all IAM and Information security professionals in IT. This book is not focused on any specific IAM tool/ product; it will provide the deep delving information on Identity and Access Management with respect to process, technology, best practices, checklists, etc.

    • ASIN: 0991320530
    • ASIN: 0991320530
    • ISBN: 0991320530
    • Manufacturer: ServiceManagers.org

  • Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management (Sun Core Series)

    Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive ... [Read More]

    • ASIN: 0133119769
    • ASIN: 0133119769
    • ISBN: 0133119769
    • Brand: Brand: Prentice Hall
    • Manufacturer: Prentice Hall

  • The Sacred Enneagram: Finding Your Unique Path to Spiritual Growth

    As featured in the Fall 2018 edition of The Magnolia Journal and on the Rise Together podcast with Dave and Rachel Hollis, For the Love podcast with Jen Hatmaker, Typology podcast with Ian Morgan Cron, and Sleeping At Last podcast with Ryan O'Neal.How to understand the 'why' behind your enneagram type.Chris Heuertz’ life was forever changed after he learned about the enneagram 15 years ago, and since then he has trained under some of the great living Enneagram masters including Father Richard Rohr, Russ Hudson, Marion Gilbert, and Helen Palmer. Today he leads enneagram workshops a... [Read More]

    • ASIN: B01N0CSDNX
    • ASIN: B01N0CSDNX
    • Brand: Zondervan
    • Manufacturer: Zondervan

  • Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

    Organizations of all kinds are recognizing the crucial importance of protecting privacy. Their customers, employees, and other stakeholders demand it. Today, failures to safeguard privacy can destroy organizational reputations — and even the organizations themselves. But implementing effective privacy protection is difficult, and there are few comprehensive resources for those tasked with doing so. In Information Privacy Engineering and Privacy by Design, renowned information technology author William Stallings brings together the comprehensive and practical guidance you need to succeed. Sta... [Read More]

    • ASIN: 0135302153
    • ASIN: 0135302153
    • ISBN: 0135302153
    • Manufacturer: Addison-Wesley Professional

  • The Culture Code: The Secrets of Highly Successful Groups

    NEW YORK TIMES BESTSELLER • The author of The Talent Code unlocks the secrets of highly successful groups and provides tomorrow’s leaders with the tools to build a cohesive, motivated culture.NAMED ONE OF THE BEST BOOKS OF THE YEAR BY BLOOMBERG AND LIBRARY JOURNAL Where does great culture come from? How do you build and sustain it in your group, or strengthen a culture that needs fixing? In The Culture Code, Daniel Coyle goes inside some of the world’s most successful organizations—including the U.S. Navy’s SEAL Team Six, IDEO, and the San Antonio Spurs—and reveals what makes th... [Read More]

    • ASIN: B01MSY1Y6Z
    • ASIN: B01MSY1Y6Z
    • Manufacturer: Bantam

  • Microsoft Azure Security Infrastructure (IT Best Practices - Microsoft Press)

    Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security a... [Read More]

    • ASIN: 150930357X
    • ASIN: 150930357X
    • ISBN: 150930357X
    • Manufacturer: Microsoft Press

  • Clinical Management of Gender Identity Disorders in Children and Adults (Clinical Practice)

    Signs of cross-gender identification have been observed in children as young as three years of age, and trans-sexualism has been diagnosed, at the opposite extreme, in eventually reasigned individuals, whose first clinical evaluation came in their 60s. Gender dysphoria occurs in females as well as males, and gender identity disorders - although probably not the same ones - occur in heterosexuals and in homosexuals. This book acquaints the reader with the various syndromes of gender identity disturbance in males and females, the different types of social circumstances in which patients find the... [Read More]

    • ASIN: 0880481870
    • ASIN: 0880481870
    • ISBN: 0880481870
    • Manufacturer: Amer Psychiatric Pub Inc

  • Awaken the Giant Within: How to Take Immediate Control of Your Mental, Emotional, Physical and Financial


    • ASIN: B001EM101Q
    • ASIN: B001EM101Q
    • Manufacturer: Free Press

  • Building Secure and Reliable Systems: SRE and Security Best Practices

    Can a system ever truly be considered reliable if it isn't fundamentally secure? In two previous O'Reilly books, experts from Google showed how reliability is fundamental to service design. Site Reliability Engineering and The Site Reliability Workbook demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems.Security is also crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, reliability, and availability. In ... [Read More]

    • ASIN: 1492083127
    • ASIN: 1492083127
    • ISBN: 1492083127
    • Manufacturer: O'Reilly Media

  • Organizational Identity in Practice

    Organizational Identity in Practice provides much-needed, in-depth studies on what happens when  aspirations, claims and beliefs interact. Given the practical needs of managers and students, this exciting new text provides readers with more insight into what differences in these identity aspirations, claims and beliefs really mean and what we may expect to occur when these differences become visible and what the outcomes of these processes are likely to be. The diverse case studies illustrate how well-known firms have dealt with the broad issues of "who we are as an organization" and "what ma... [Read More]

    • ASIN: 0415398401
    • ASIN: 0415398401
    • ISBN: 0415398401
    • Brand: Brand: Routledge
    • Manufacturer: Routledge

  • Serverless Design Patterns and Best Practices: Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity

    Get started with designing your serverless application using optimum design patterns and industry standard practicesKey FeaturesLearn the details of popular software patterns and how they are applied to serverless applicationsUnderstand key concepts and components in serverless designsWalk away with a thorough understanding of architecting serverless applicationsBook DescriptionServerless applications handle many problems that developers face when running systems and servers. The serverless pay-per-invocation model can also result in drastic cost savings, contributing to its popularity. While ... [Read More]

    • ASIN: B0773M31S5
    • ASIN: B0773M31S5
    • Manufacturer: Packt Publishing

  • Eleventh Hour CISSP®: Study Guide

    Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. ... [Read More]

    • ASIN: B01LNFMIU0
    • ASIN: B01LNFMIU0
    • Manufacturer: Syngress

  • Focus on Iam (Identity and Access Management) : Csfs, Metrics, Checklists, Best Practices, and Guidelines for Defining Iam Processes and Implementing Iam Solutions

    Focus on IAM (Identity and Access Management) is a very unique book addressing all the facets of IAM. It is written for all IAM and Information security professionals in IT. This book is not focused

    • UPC: 855883938

  • Web Content Management : Systems, Features, and Best Practices

    "Looking to select a web content management system (CMS), but confused about the promises, terminology, and buzzwords? Do you want to understand content management without having to dive into the underlying programming? This book provides

    • UPC: 44979023

  • Best Practices: Time Management - eBook

    There are only twenty-four hours in a day, but you can make them count. Time Management, a comprehensive and essential resource for any manager on the run, shows you how.Learn to:Set and prioritize goals, objectives,

    • UPC: 449836318

  • Methadone Maintenance Treatment : Best Practices in Case Management

    Clients talk about working with case managers: "They stick with me through thick and thin, no matter how much I'm using. They don't give up on me." "[People need] help with lots of things: legal

    • UPC: 53373317

  • Anger Management Best Practice Handbook: Controlling Anger Before it Controls You, Proven Techniques and Exercises for Anger Management - Second Edition - eBook

    Get Rid Of Anger Fast, Don't let anger control your life and Stop hurting the ones you love. A huge revision from the First Edition, which is a bestseller, with lots of extra chapters such

    • UPC: 161038829

  • Compendium of Best Practices in Road Asset Management - eBook

    The objective of road asset management is generally to optimize economic benefits by minimizing maintenance costs and road user costs. This compendium presents the best practices for the introduction and development of road asset management

    • UPC: 403294041

  • Open Source Identity Management Patterns and Practices Using OpenAM 10.x - eBook

    This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x. Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects

    • UPC: 219815177

  • Anger Management Best Practice Handbook: Controlling Anger Before it Controls You, Anger Management Proven Techniques and Excercises - eBook

    This book covers all the Methods of Anger Management for a balanced approach to managing anger, which both controls the emotion and allows the emotion to express itself in a healthy way. Some descriptions of

    • UPC: 642070309

  • Best Classroom Management Practices for Reaching All Learners - eBook

    This collection of advice from expert teachers brings together the best of classroom management by compiling suggestions, tactics, and plans for improving classroom management

    • UPC: 323169352

  • Project Management Essentials : A Quick and Easy Guide to the Most Important Concepts and Best Practices for Managing Your Projects Right

    If you're new to project management or need to refresh your knowledge, Project Management Essentials, Third Edition is the quickest and easiest way to learn how to manage projects successfully. The concepts presented are not

    • UPC: 22897612

  • Hybrid identity and access management best practices - BRK3243

    Best practices for Identity and Access Management on Compute Engine (Google Cloud Next '17)

    Azure Security and Identity Management Best Practices