You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In the twelfth century, Abd al-Latif al-Baghdadi affirmed that the Egyptian baths were "the most beautiful in the East, the most practical, and the best located." Nine centuries later, forgotten by the country's restoration campaign, Cairo's few remaining steam baths are drowning in general indifference. Places of relaxation and ritual, known for their therapeutic virtues, the last public baths are attempting to resist the evolution of tradition and real estate pressure. Curiously, the dilapidated state of the buildings, with their outstanding architecture, is full of charm: the decor is bright, flashy, and oriental, and the mixture of unusual objects creates a unique atmosphere. This book, with its exceptional color photographs and personal narrative, invites you into the intimacy of these bathhouses from another age before their definitive disappearance.
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
Coping with Global Environmental Change, Disasters and Security - Threats, Challenges, Vulnerabilities and Risks reviews conceptual debates and case studies focusing on disasters and security threats, challenges, vulnerabilities and risks in Europe, the Mediterranean and other regions. It discusses social science concepts of vulnerability and risks, global, regional and national security challenges, global warming, floods, desertification and drought as environmental security challenges, water and food security challenges and vulnerabilities, vulnerability mapping of environmental security challenges and risks, contributions of remote sensing to the recognition of security risks, mainstreaming early warning of conflicts and hazards and provides conceptual and policy conclusions.
The business to business trade publication for information and physical Security professionals.
How companies can maintain computer security is the topic of this book, which shows how to create a Computer Security Incident Response Team, generally called a CSIRT.
Families around the world celebrate faith in many different ways—through praying, singing, learning, helping, caring, and more. With stunning photographs from many cultures and religious traditions, Faith celebrates the ways in which people worship around the globe . Thematically organized back matter gives additional information on common expressions of faith, and a glossary describes particular religions and elements of faith depicted in the book. A portion of the proceeds from the sales of this book helps support The Global Fund for Children’s grantmaking to community-based projects serving vulnerable children around the world.
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
"Computer Security Handbook" - Jetzt erscheint der Klassiker in der 4. aktualisierten Auflage. Es ist das umfassendste Buch zum Thema Computersicherheit, das derzeit auf dem Markt ist. In 23 Kapiteln und 29 Anhängen werden alle Aspekte der Computersicherheit ausführlich behandelt. Die einzelnen Kapitel wurden jeweils von renommierten Experten der Branche verfasst. Übersichtlich aufgebaut, verständlich und anschaulich geschrieben. Das "Computer Security Handbook" wird in Fachkreisen bereits als DAS Nachschlagewerk zu Sicherheitsfragen gehandelt.
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.