-
MySpace Unraveled: A Parent’s Guide to Teen Social Networking from the Directors of BlogSafety.com
Author Anne Collier , Larry Magid
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience f....
Release Date 2006/08 -
Author J. Stuart Bunderson , Bret Sanner
Research on social species shows that hierarchies are important for group functioning. Human beings also have a tendency to think and act hierarchically. In fact, hierarchies — distinct differences in group members' power and status — can be found in v....
Release Date 2018/01 -
Social Engineering in IT Security: Tools, Tactics, and Techniques
Author Sharon Conheady
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to att....
Release Date 2014/08 -
Author Andrew Bindner , James Broad
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you thr....
Release Date 2013/12 -
Social Engineering Penetration Testing
Author Richard Ackroyd , Andrew Mason , Gavin Watson
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and e....
Release Date 2014/04 -
Tissue Engineering, 2nd Edition
Author Jan De Boer , Clemens Van Blitterswijk
Tissue Engineering is a comprehensive introduction to the engineering and biological aspects of this critical subject. With contributions from internationally renowned authors, it provides a broad perspective on tissue engineering for students coming to the subject ....
Release Date 2014/12 -
Author Lance Kaplan , Tarek Abdelzaher , Dong Wang
Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field ....
Release Date 2015/04 -
Google Hacking for Penetration Testers, 3rd Edition
Author Justin Brown , Bill Gardner , Johnny Long
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade sec....
Release Date 2015/11 -
Coding for Penetration Testers, 2nd Edition
Author Ryan Linn , Jason Andress
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool....
Release Date 2016/09 -
Assemble the Social Web with zembly
Author Chris Webster , Todd Fast , Paul Anderson , Gail Anderson
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More! With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and....
Release Date 2008/12 -
A Brief Look at Some Businesses Based on Shared Social Experience
Author Rawn Shah
This Element is an excerpt from Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs (9780132357791) by Rawn Shah. Available in print and digital formats.¿Lessons from some of today’s most innovative social businesses: last.fm, Li....
Release Date 2010/04 -
A Short Overview of Social Networks and Their Uses
Author Juliette Powell
This Element is an excerpt from 33 Million People in the Room: How to Create, Influence, and Run a Successful Business with Social Networking (9780137154357) by Juliette Powell. Available in print and digital formats.Profiling the world of social networks: what you ....
Release Date 2010/05 -
Where Does Social Security Fit Into Your Retirement?
Author Paul B. Brown , Frank Armstrong
This Element is an excerpt from Save Your Retirement: What to Do If You Haven’t Saved Enough or If Your Investments Were Devastated by the Market Meltdown (9780137029006) by Frank Armstrong, III and Paul B. Brown. Available in print and digital formats.A clear-eyed ....
Release Date 2010/09 -
From Oz to Kansas: Almost Every Black and White Conversion Technique Known to Man
Author Vincent Versace
The ability to create a stunning black and white image remains one of photography’s greatest and most aspirational skills. Being able to "see" in black and white is an enviable capability, and a well-crafted black and white photograph remains the finest of the fine ....
Release Date 2012/08 -
The Technical and Social History of Software Engineering
Author Capers Jones
“Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data. Now, Capers performs yet another invaluable service to our industry, by documenting, for the first time, i....
Release Date 2013/11 -
Scenario-Focused Engineering: A toolbox for innovation and customer-centricity
Author Drew Fletcher , Austina De Bonte
Blend the art of innovation with the rigor of engineeringGreat technology alone is rarely sufficient to ensure a product’s success. Scenario-Focused Engineering is a customer-centric, iterative approach used to design and deliver the seamless experiences and emotion....
Release Date 2014/12 -
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits, First edition
Author William Easttom
The perfect introduction to pen testing for all IT professionals and studentsClearly explains key concepts, terminology, challenges, tools, and skillsCovers the latest penetration testing standards from NSA, PCI, and NISTWelcome to today’s most useful and practical....
Release Date 2018/03 -
Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs
Author Rawn Shah
The First Best-Practice Guide to Executing Any Type of Social Computing ProjectOrganizations today aren’t just participating in social networking, collaborative computing, and online communities--they are depending on those communities to play crucially important ro....
Release Date 2010/01 -
Author James S. Tiller
This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. It goes beyond the technical aspects of penetration testing to address th....
Release Date 2004/09 -
Author Joshua Porter
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the righ....
Release Date 2008/04 -
Practical Negotiating: Tools, Tactics & Techniques
Author Tom Gosselin
Praise for Practical Negotiating: Tools, Tactics & Techniques"Practical Negotiating is an innovative, resourceful, and-as its name implies-practical guide to the art and science of negotiating. Unlike many books on negotiating, which are filled with theories and....
Release Date 2007/05 -
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Author Kevin D. Mitnick , William L. Simon
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestsellingThe Art of DeceptionKevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malici....
Release Date 2005/03 -
Social Innovation, Inc.: 5 Strategies for Driving Business Growth through Social Change
Author Jason Saul
Could Wal-Mart offer a better solution to healthcare than Medicaid? Could GE help reduce global warming faster than the Kyoto protocol?Social Innovation, Inc. declares a new era where companies profit from social change. Leading corporations like GE, Wellpoint, Trav....
Release Date 2010/10 -
Social Work Visions from Around the Globe
Author Anneli Pohjola , Pirkko-Liisa Ranhalon , Teppo Kroger , Anna Metten
Increase the effectiveness of the services you provide to clientsSocial Work Visions from Around the Globe examines the fundamental principles and dilemmas of social work with people whose health is under threat. This valuable resource was compiled from materi....
Release Date 2013/07 -
Author Mark Babbitt , Ted COINÉ
The Social Revolution's impact on the business world cannot be over-estimated. Like the meteor that likely precipitated the end of the dinosaurs, Social is the catalyst in an extinction event--and business as we know it has changed forever. A World Gone Social....
Release Date 2014/09 -
Author Soren Kenner , Imran Rashid
Authors Imran Rashid and Soren Kenner have sparked an international debate by revealing the “mind hacks” Facebook, Apple, Google, and Instagram use to get you and your children hooked on their products. In Offline, they deliver an eye-opening research-based journey....
Release Date 2019/02 -
Tissue Engineering Using Ceramics and Polymers, 2nd Edition
Author P.X. Ma , Aldo R Boccaccini
The second edition of Tissue Engineering Using Ceramics and Polymers comprehensively reviews the latest advances in this area rapidly evolving area of biomaterials science. Part one considers the biomaterials used for tissue engineering. It introduces the properties....
Release Date 2014/06 -
Author Peter Yaworski
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbu....
Release Date 2019/06 -
Social Entrepreneurship: An Evidence-Based Approach to Creating Social Value
Author Wolfgang Bielefeld , Chao Guo
Social entrepreneurship explainedSocial entrepreneurship is a hot topic in public and non-profit management. Organizations everywhere are looking for innovative ways to respond to financial, social, and regulatory pressures. The next generation of transformative lea....
Release Date 2014/03