-
Author Frank Wander
Practical, proven guidance for transforming the culture of any IT departmentAs more and more jobs are outsourced, and the economy continues to struggle, people are looking for an alternative to the greed-driven, selfish leadership that has resulted in corporations w....
Release Date 2013/02 -
Profit + Purpose: How Social Innovation Is Transforming Business for Good
Author Kyle Westaway
World-changing ideas become reality with practical, effective planningProfit + Purpose: Tools to Structure, Fund, and Run a Social Enterprise is a practical step-by step guide to creating a successful socially-oriented business venture. With practical, actionable gu....
Release Date 2014/09 -
Unmasking the Social Engineer: The Human Element of Security
Author Paul Ekman , Paul Kelly F. , Christopher Hadnagy
Learn to identify the social engineer by non-verbal behaviorUnmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men ....
Release Date 2014/02 -
Social Security For Dummies, 2nd Edition
Author Jonathan Peterson
Praise for Social Security For Dummies:"Social Security for Dummies is a must read for people of any age who want a comfortable retirement. Jonathan Peterson does a great job of explaining this complicated system and helps you understand how to get the most from the....
Release Date 2015/03 -
Author Camilo Olaya , César García-Díaz
Uniquely reflects an engineering view to social systems in a wide variety of contexts of applicationSocial Systems Engineering: The Design of Complexity brings together a wide variety of application approaches to social systems from an engineering viewpoint. The bo....
Release Date 2017/12 -
Author Mehmet Sahinoglu
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of....
Release Date 2016/05 -
Can't Not Do: The Compelling Social Drive that Changes Our World
Author Paul Shoemaker
With so many social challenges facing our world, trying to effect change feels daunting. The problems are complex, the politics murky, and the players innumerable. Yet, every day there are regular heroes making a significant impact on our most intractable social is....
Release Date 2015/08 -
Social Movements for Good: How Companies and Causes Create Viral Change
Author Derrick Feldmann
Create real change in the new social movement paradigmSocial Movements for Good is a guidebook for driving change, by taking advantage of the social "currency" that makes movements go viral. Author Derrick Feldmann has spent a career showing organizations how to be....
Release Date 2016/02 -
Hacking For Dummies, 5th Edition
Author Kevin Beaver
Learn to hack your own system to protect against malicious attacks from outsideIs hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your ne....
Release Date 2015/12 -
Author Wil Allsopp
Build a better defense against motivated, organized, professional attacksAdvanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not....
Release Date 2017/03 -
Social Engineering, 2nd Edition
Author Christopher Hadnagy
Harden the human firewall against the most current threatsSocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus softw....
Release Date 2018/07 -
Hacking For Dummies, 6th Edition
Author Kevin Beaver
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penet....
Release Date 2018/07 -
Penetration Testing For Dummies
Author Robert Shimonski
Target, test, analyze, and report on security vulnerabilities with pen testingPen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It ....
Release Date 2020/05 -
CompTIA PenTest+ Certification For Dummies
Prepare for the CompTIA PenTest+ certification CompTIA's PenTest+ Certification is an essential certification to building a successful penetration testing career. Test takers must pass an 85-question exam to be certified, and this book—plus the online test bank—will help you reach your certifi.... -
Author Theodore J. Sarenski
The long-term future of the American Social Security system which provides retirement, disability, and survivor benefits to millions, is uncertain. This is triggering big concerns for many workers who are paying into the system and need to make decisions about their retir....
Release Date 2020/07 -
Author Amy Sample Ward , Afua Bruce
Changing the way we use, develop, and fund technology for social change is possible, and it starts with you. The Tech That Comes Next: How Changemakers, Philanthropists, and Technologists Can Build an Equitable World outlines a vision of a more equitable and just world along with practical steps to ....
Release Date 2022/03 -
GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
Author Raymond Nutting , Mirza Ahmed , William MacCormack
This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester exam This effective self-study guide fully prepares you for the Global Information Assurance Certification’s challenging Penetration Tester exam, which validates advanced....
Release Date 2020/11 -
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition
Author Allen Harper , Ryan Linn , Stephen Sims , Michael Baucom , Huascar Tejeda , Daniel Fe
Up-to-date strategies for thwarting the latest, most insidious network attacksThis fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at ma....
Release Date 2022/03 -
Ethical Hacking: Techniques, Tools, and Countermeasures, 4th Edition
Author Michael G. Solomon , Sean-Philip Oriyano
Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous....
Release Date 2022/11 -
Ethical Hacking and Penetration Testing Guide
Author Rafay Baloch
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret ....
Release Date 2017/09 -
White Space Is Not Your Enemy, 3rd Edition
Author Rebecca Hagen , Kim Golombisky
White Space Is Not Your Enemy is a practical graphic design and layout guide that introduces concepts and practices necessary for producing effective visual communication across a variety of formats—from web to print. Sections on Gestalt theory, color theory, and W....
Release Date 2017/02 -
Author Richard Swedberg
A practical guide to the art of theorizing in the social sciencesIn the social sciences today, students are taught theory by reading and analyzing the works of Karl Marx, Max Weber, and other foundational figures of the discipline. What they rarely learn, however, ....
Release Date 2014/08 -
Social Evolution and Inclusive Fitness Theory
Author James A.R. Marshall
Social behavior has long puzzled evolutionary biologists, since the classical theory of natural selection maintains that individuals should not sacrifice their own fitness to affect that of others. Social Evolution and Inclusive Fitness Theory argues that a theory ....
Release Date 2015/04 -
11 Rules for Creating Value in the Social Era
Author Nilofer Merchant
The era of social technologies provides seemingly endless opportunity, both for individuals and organizations. But it’s also the subject of seemingly endless hype. Yes, social tools allow us to do things entirely differently—but how do you really capitalize on that?....
Release Date 2012/09 -
The Complete Idiot's Guide to Enhancing Your Social IQ
Author Gregory P. Korgeski
Simple steps to connecting with others. Now readers can raise their social intelligence quotient with a little self-Knowledge and practice. Beginning with a series of short quizzes that generate a personal social profile, this guide explains how readers can enhance....
Release Date 2008/12 -
Mining the Social Web, 2nd Edition
Author Matthew A. Russell
How can you tap into the wealth of social web data to discover who’s making connections with whom, what they’re talking about, and where they’re located? With this expanded and thoroughly revised edition, you’ll learn how to acquire, analyze, and summarize data from....
Release Date 2013/10 -
Boundary Element Techniques in Engineering
Author S. Walker , C. A. Brebbia
Boundary Element Techniques in Engineering deals with solutions of two- and three-dimensional problems in elasticity and the potential theory where finite elements are inefficient. The book discusses approximate methods, higher-order elements, elastostatics, time-de....
Release Date 2016/01 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Brad Hibbert , Morey J. Haber
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breache....
Release Date 2017/12 -
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Author Sanjib Sinha
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux....
Release Date 2018/11