-
Social Ontology of Whoness, 3rd Edition
Author Michael Eldred
How are core social phenomena to be understood as modes of being? This book offers an alternative approach to social ontology. Recent interest in social ontology on the part of mainstream philosophy and the social sciences presupposes from the outset that the human....
Release Date 2018/10 -
Author LID Editorial
Who you know has always been as important as what you know, and social or business networks (that is, groups of people connecting together with a common interest) have existed since time began. Your connections can help with everything from business deals or career ....
Release Date 2014/06 -
Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs
Author Rawn Shah
The First Best-Practice Guide to Executing Any Type of Social Computing ProjectOrganizations today aren’t just participating in social networking, collaborative computing, and online communities--they are depending on those communities to play crucially important ro....
Release Date 2010/01 -
Social Movements for Good: How Companies and Causes Create Viral Change
Author Derrick Feldmann
Create real change in the new social movement paradigmSocial Movements for Good is a guidebook for driving change, by taking advantage of the social "currency" that makes movements go viral. Author Derrick Feldmann has spent a career showing organizations how to be....
Release Date 2016/02 -
Social Innovation, Inc.: 5 Strategies for Driving Business Growth through Social Change
Author Jason Saul
Could Wal-Mart offer a better solution to healthcare than Medicaid? Could GE help reduce global warming faster than the Kyoto protocol?Social Innovation, Inc. declares a new era where companies profit from social change. Leading corporations like GE, Wellpoint, Trav....
Release Date 2010/10 -
Social Evolution and Inclusive Fitness Theory
Author James A.R. Marshall
Social behavior has long puzzled evolutionary biologists, since the classical theory of natural selection maintains that individuals should not sacrifice their own fitness to affect that of others. Social Evolution and Inclusive Fitness Theory argues that a theory ....
Release Date 2015/04 -
Social Entrepreneurship: An Evidence-Based Approach to Creating Social Value
Author Wolfgang Bielefeld , Chao Guo
Social entrepreneurship explainedSocial entrepreneurship is a hot topic in public and non-profit management. Organizations everywhere are looking for innovative ways to respond to financial, social, and regulatory pressures. The next generation of transformative lea....
Release Date 2014/03 -
Author Melissa M. Stone , Terri D. Barreiro
This book provides a guided deep dive into the early stages of venture development of social entrepreneurship. It introduces concepts that provide important insights necessary for social venture success. It introduces a set of entrepreneurial tools designed for the ....
Release Date 2013/08 -
Social Engineering, 2nd Edition
Author Christopher Hadnagy
Harden the human firewall against the most current threatsSocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus softw....
Release Date 2018/07 -
Social Engineering Penetration Testing
Author Richard Ackroyd , Andrew Mason , Gavin Watson
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and e....
Release Date 2014/04 -
Social Engineering in IT Security: Tools, Tactics, and Techniques
Author Sharon Conheady
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to att....
Release Date 2014/08 -
Social dilemmas, institutions, and the evolution of cooperation
Author Wojtek Przepiorka , Ben Jann
The question of how cooperation and social order can evolve from a Hobbesian state of nature of a “war of all against all” has always been at the core of social scientific inquiry. Social dilemmas are the main analytical paradigm used by social scientists to explai....
Release Date 2017/09 -
Social Development Through Benevolent Business
Author Kalyan Sankar Mandal
This book points out that apart from usual “profit- maximizing business,”, there are some other types of business models which that serve social causes with profit. The author discusses some such business models, namely, social business, compassionate b....
Release Date 2018/01 -
Social Development in Independent India
Author Muchkund Dubey , Rajiv Balakrishnan
Social Development in Independent India: Paths Tread and the Road Ahead provides an overview of social development in India in the past 60 years and also deals with the emerging issues in the 21st century. The book discusses how social development has acquired a glo....
Release Date 2007/10 -
Author Mark Redmond
Social decentering theory was developed in response to the confusion created by the use of the term empathy and to a lesser extent, perspective-taking, to reflect a wide and varied set of human cognitive processes and behaviors. Theory of Social Decentering: A Theo....
Release Date 2018/05 -
Social Capital, Social Identities
Author Hans Bernhard Schmid , Christoph Henning , Dieter Thomä
Current research on social capital tends to focus on an economic reading of social relations. Whereas economists pride themselves on reaching out to social theory at-large, sociologists criticize the economization of the social fabric. The concept of social capital....
Release Date 2014/08 -
Scenario-Focused Engineering: A toolbox for innovation and customer-centricity
Author Drew Fletcher , Austina De Bonte
Blend the art of innovation with the rigor of engineeringGreat technology alone is rarely sufficient to ensure a product’s success. Scenario-Focused Engineering is a customer-centric, iterative approach used to design and deliver the seamless experiences and emotion....
Release Date 2014/12 -
Author Peter Yaworski
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbu....
Release Date 2019/06 -
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Author Sagar Rahalkar
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanni....
Release Date 2018/11 -
Python: Penetration Testing for Developers
Author Dave Mound , Benjamin May , Andrew Mabbitt , Terry Ip , Cameron Buchanan , Mohit , Chr
Unleash the power of Python scripting to execute effective and efficient penetration testsAbout This BookSharpen your pentesting skills with PythonDevelop your fluency with Python to write sharper scripts for rigorous security testingGet stuck into some of the most....
Release Date 2016/10 -
Python Penetration Testing Essentials
Author Mohit
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.About This BookDetect and avoid various attack types that put the privacy of a ....
Release Date 2018/05 -
Author Hussam Khrais
Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming languageAbout This BookComprehensive information on building a web application penetration testing framework using PythonMaster....
Release Date 2018/04 -
Python Ethical Hacking from Scratch
Explore the world of practical ethical hacking by developing custom network scanning and remote access tools that will help you test the system security of your organizationKey FeaturesGet hands-on with ethical hacking and learn to think like a real-life hackerBuild practical ethical hacking tools f.... -
Profit + Purpose: How Social Innovation Is Transforming Business for Good
Author Kyle Westaway
World-changing ideas become reality with practical, effective planningProfit + Purpose: Tools to Structure, Fund, and Run a Social Enterprise is a practical step-by step guide to creating a successful socially-oriented business venture. With practical, actionable gu....
Release Date 2014/09 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Brad Hibbert , Morey J. Haber
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breache....
Release Date 2017/12 -
Practical Web Penetration Testing
Author Gus Khawaja
Learn how to execute web application penetration testing end-to-endAbout This BookBuild an end-to-end threat model landscape for web application securityLearn both web application vulnerabilities and web intrusion testingAssociate network vulnerabilities with a web....
Release Date 2018/06 -
Practical Negotiating: Tools, Tactics & Techniques
Author Tom Gosselin
Praise for Practical Negotiating: Tools, Tactics & Techniques"Practical Negotiating is an innovative, resourceful, and-as its name implies-practical guide to the art and science of negotiating. Unlike many books on negotiating, which are filled with theories and....
Release Date 2007/05 -
Penetration Testing: A guide for business and IT managers
Author Peter Taylor , Felix Ryan , Tylor Robinson , Gemma Moore , Moinuddin Zaki , Jims Marc
Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers becom....
Release Date 2019/08 -
Penetration Testing with Shellcode
Author Hamza Megahed
Master Shellcode to leverage the buffer overflow conceptAbout This BookUnderstand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and MetasploitLearn to write and modify 64-bit shellcode along with kernel-level s....
Release Date 2018/02 -
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits, First edition
Author William Easttom
The perfect introduction to pen testing for all IT professionals and studentsClearly explains key concepts, terminology, challenges, tools, and skillsCovers the latest penetration testing standards from NSA, PCI, and NISTWelcome to today’s most useful and practical....
Release Date 2018/03