Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Item Type
      Item Type
      Clear All
      Item Type
  • Is Full-Text Available
      Is Full-Text Available
      Clear All
      Is Full-Text Available
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Subject
    • Publisher
    • Source
    • Donor
    • Place of Publication
    • Contributors
    • Location
2 result(s) for "Short, Philip, author"
Sort by:
Mao : the man who made China
One of the great figures of the twentieth century, Chairman Mao looms irrepressibly over the economic rise of China. Mao Zedong was the leader of a revolution, a communist who lifted hundreds of millions out of poverty, an aggressive and distrustful leader, and a man responsible for more civilian deaths than perhaps any other historical figure. Now, four decades after Mao's death, acclaimed biographer Philip Short presents a fully updated and revised edition of his ground-breaking and masterly biography. Vivid, uncompromising and unflinching, Short presents in one-volume the man behind the propaganda - his family, his beliefs and his horrors. In doing so he shows us both the human being Mao was, and the monster he became.
Cybersecurity essentials
\"Cybersecurity Essentials\" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.