-
11 Rules for Creating Value in the Social Era
Author Nilofer Merchant
The era of social technologies provides seemingly endless opportunity, both for individuals and organizations. But it’s also the subject of seemingly endless hype. Yes, social tools allow us to do things entirely differently—but how do you really capitalize on that?....
Release Date 2012/09 -
A Brief Look at Some Businesses Based on Shared Social Experience
Author Rawn Shah
This Element is an excerpt from Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs (9780132357791) by Rawn Shah. Available in print and digital formats.¿Lessons from some of today’s most innovative social businesses: last.fm, Li....
Release Date 2010/04 -
A Short Overview of Social Networks and Their Uses
Author Juliette Powell
This Element is an excerpt from 33 Million People in the Room: How to Create, Influence, and Run a Successful Business with Social Networking (9780137154357) by Juliette Powell. Available in print and digital formats.Profiling the world of social networks: what you ....
Release Date 2010/05 -
Author M. K. Jabbi , Muchkund Dubey
At the tenth SAARC Summit, it was agreed that an inter-governmental social charter for South Asia under the aegis of SAARC would be prepared. In India, the Council for Social Development formulated the citizens' social charter. The development of the social char....
Release Date 2009/12 -
Author Mark Babbitt , Ted COINÉ
The Social Revolution's impact on the business world cannot be over-estimated. Like the meteor that likely precipitated the end of the dinosaurs, Social is the catalyst in an extinction event--and business as we know it has changed forever. A World Gone Social....
Release Date 2014/09 -
Advanced Infrastructure Penetration Testing
Author Chiheb Chebbi
A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructureAbout This BookAdvanced exploitation techniques to breach modern operating systems and complex network....
Release Date 2018/02 -
Author Wil Allsopp
Build a better defense against motivated, organized, professional attacksAdvanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not....
Release Date 2017/03 -
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Author Kevin Cardwell , Lee Allen
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environmentsAbout This BookLearn how to build your own pentesting lab environment to practice advanced techniquesCustomize your own scripts, and learn methods to exploit 32....
Release Date 2016/03 -
An Introduction to Hacking and Crimeware
Author Victoria Loewengart
Defend your business, protect your livelihood, safeguard your future.Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits ....
Release Date 2012/01 -
Applying Social Tools to Learning
Author Dave Wilkins
With social learning, the whole company is part of the learning and development team. This Infoline will show you how to strategically design effective and agile social learning strategies that address the unique needs of various learning initiatives. Learn about th....
Release Date 2012/04 -
Assemble the Social Web with zembly
Author Chris Webster , Todd Fast , Paul Anderson , Gail Anderson
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More! With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and....
Release Date 2008/12 -
Author Adrian Pruteanu
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker.Key FeaturesBuilds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Exa....
Release Date 2019/01 -
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Author Sanjib Sinha
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux....
Release Date 2018/11 -
Boundary Element Techniques in Engineering
Author S. Walker , C. A. Brebbia
Boundary Element Techniques in Engineering deals with solutions of two- and three-dimensional problems in elasticity and the potential theory where finite elements are inefficient. The book discusses approximate methods, higher-order elements, elastostatics, time-de....
Release Date 2016/01 -
Building a Pentesting Lab for Wireless Networks
Author Andrey Popov , Vyacheslav Fadyushin
Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniquesAbout This BookDesign and build an extendable penetration testing lab with wireless access suitable for home and enterprise useFill the lab with various compo....
Release Date 2016/03 -
Building a Successful Social Venture
Author James Koch , Eric Carlson
This is the first book on creating and running a social enterprise to combine theoretical discussions with current cases from around the world, filling a huge gap in the literature. It serves as an eminently practical blueprint for those who wish to build, sus....
Release Date 2018/09 -
Can't Not Do: The Compelling Social Drive that Changes Our World
Author Paul Shoemaker
With so many social challenges facing our world, trying to effect change feels daunting. The problems are complex, the politics murky, and the players innumerable. Yet, every day there are regular heroes making a significant impact on our most intractable social is....
Release Date 2015/08 -
Chaos Engineering Observability
Author Russ Miles
Chaos engineering is a highly collaborative activity. When applied well, virtually everyone is responsible for exploring, surfacing, overcoming, and validating weaknesses in their systems. That can lead to a lot of chaos engineering activity across a collection of ....
Release Date 2019/04 -
Coding for Penetration Testers, 2nd Edition
Author Ryan Linn , Jason Andress
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool....
Release Date 2016/09 -
CompTIA PenTest+ Certification For Dummies
Prepare for the CompTIA PenTest+ certification CompTIA's PenTest+ Certification is an essential certification to building a successful penetration testing career. Test takers must pass an 85-question exam to be certified, and this book—plus the online test bank—will help you reach your certifi.... -
Author Steve Winterfeld , Jason Andress
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The ....
Release Date 2011/07 -
Author Mehmet Sahinoglu
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of....
Release Date 2016/05 -
Author Gretchen Anderson
Designers of all stripes today are seeking social and civic projects that have a mission to serve the greater good at their core. Part of this growing trend stems from the desire to use skills for their highest potential. But the real payoff is the ability to use n....
Release Date 2015/06 -
Author Joshua Porter
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the righ....
Release Date 2008/04 -
Digital Forensics with Kali Linux
Author Shiva V.N. Parasram
Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using this comprehensive guideAbout This BookMaster powerful Kali Linux tools for digital investigation and analysisPerform evidence acquisition, preservation, and analys....
Release Date 2017/12 -
Digital Forensics with Kali Linux - Second Edition
Author Shiva V. N. Parasram
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety o....
Release Date 2020/04 -
Educating Social Entrepreneurs, Volume I
Author Maria Aggestam , Paul Miesing
Educating Social Entrepreneurs: From Idea Generation to Business Plan Formulation appears at a time of unprecedented environmental disasters, natural resources depletion, and significant failure of governments and global businesses to attend to worldwide social pro....
Release Date 2017/07 -
Educating Social Entrepreneurs, Volume II
Author Maria Aggestam , Paul Miesing
Educating Social Entrepreneurs: From Business Plan Formulation to Implementation appears at a time of unprecedented environmental disasters, natural resources depletion, and significant failure of governments and global businesses to attend to worldwide social prob....
Release Date 2017/07 -
Effective Python Penetration Testing
Author Rejah Rehim
Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This BookLearn to utilize your Python scripting skills to pentest a computer system, network, and web-applicationGet proficient at the art of assess....
Release Date 2016/06 -
Enhancing Learning and Teaching Through Student Feedback in Social Sciences
Author Patricie Mertova , Chenicheri Sid Nair
This title is the second Chandos Learning and Teaching Series book that explores themes surrounding enhancing learning and teaching through student feedback. It expands on topics covered in the previous publication, and focuses on social science disciplines. The edi....
Release Date 2013/02