-
Social Development Through Benevolent Business
Author Kalyan Sankar Mandal
This book points out that apart from usual “profit- maximizing business,”, there are some other types of business models which that serve social causes with profit. The author discusses some such business models, namely, social business, compassionate b....
Release Date 2018/01 -
Author M. K. Jabbi , Muchkund Dubey
At the tenth SAARC Summit, it was agreed that an inter-governmental social charter for South Asia under the aegis of SAARC would be prepared. In India, the Council for Social Development formulated the citizens' social charter. The development of the social char....
Release Date 2009/12 -
Hands-On Bug Hunting for Penetration Testers
Author Joseph Marshall
Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.Key FeaturesLearn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book Desc....
Release Date 2018/09 -
Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition
Author Vivek Ramachandran , Cameron Buchanan
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack.About This BookLearn wireless penetration testi....
Release Date 2017/12 -
Environmental Protection and the Social Responsibility of Firms
Author Richard Professor Vietor , Robert Professor Stavins , Bruce Professor Hay
Everyone agrees that firms should obey the law. But beyond what the law requires-beyond bare compliance with regulations-do firms have additional social responsibilities to commit resources voluntarily to environmental protection? How should we think about firms sac....
Release Date 2010/09 -
Building a Successful Social Venture
Author James Koch , Eric Carlson
This is the first book on creating and running a social enterprise to combine theoretical discussions with current cases from around the world, filling a huge gap in the literature. It serves as an eminently practical blueprint for those who wish to build, sus....
Release Date 2018/09 -
The Art of Network Penetration Testing
The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network. As you brute force passwords,.... -
11 Rules for Creating Value in the Social Era
Author Nilofer Merchant
The era of social technologies provides seemingly endless opportunity, both for individuals and organizations. But it’s also the subject of seemingly endless hype. Yes, social tools allow us to do things entirely differently—but how do you really capitalize on that?....
Release Date 2012/09 -
Social Entrepreneurship: An Evidence-Based Approach to Creating Social Value
Author Wolfgang Bielefeld , Chao Guo
Social entrepreneurship explainedSocial entrepreneurship is a hot topic in public and non-profit management. Organizations everywhere are looking for innovative ways to respond to financial, social, and regulatory pressures. The next generation of transformative lea....
Release Date 2014/03 -
Kali Linux Web Penetration Testing Cookbook - Second Edition
Author Gilberto Najera-Gutierrez
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilities Conduct a preliminary assessment of attack surfaces and run exploits in your lab E....
Release Date 2018/08 -
Author Sagar Rahalkar
An easy to digest practical guide to Metasploit covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics.About This BookCarry out penetration testing in highly-secured envir....
Release Date 2017/07 -
I'm Not Afraid of GDPI, 2nd Edition
Author Tuhina Anukul Varshney
In today's cut throat competitive world, an enhanced personality, excellent communication and GDPI skills are essential facets of job seeking candidates to land the best jobs. I'm Not Afraid of GDPI, 2e comprehensively deals with every aspect of the hiring proce....
Release Date 2016/01 -
The Technical and Social History of Software Engineering
Author Capers Jones
“Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data. Now, Capers performs yet another invaluable service to our industry, by documenting, for the first time, i....
Release Date 2013/11 -
Learn Ethical Hacking from Scratch
Author Zaid Sabih
Learn how to hack systems like black hat hackers and secure them like security experts Key FeaturesUnderstand how computer systems work and their vulnerabilitiesExploit weaknesses and hack into machines to test their securityLearn how to secure systems from hackers....
Release Date 2018/07 -
Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs
Author Rawn Shah
The First Best-Practice Guide to Executing Any Type of Social Computing ProjectOrganizations today aren’t just participating in social networking, collaborative computing, and online communities--they are depending on those communities to play crucially important ro....
Release Date 2010/01 -
The Complete Idiot's Guide to Enhancing Your Social IQ
Author Gregory P. Korgeski
Simple steps to connecting with others. Now readers can raise their social intelligence quotient with a little self-Knowledge and practice. Beginning with a series of short quizzes that generate a personal social profile, this guide explains how readers can enhance....
Release Date 2008/12 -
Mastering Kali Linux Wireless Pentesting
Author Brian Sak , Jilumudi Raghu Ram
Test your wireless network's security and master advanced wireless penetration techniques using Kali LinuxAbout This BookDevelop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive in....
Release Date 2016/02 -
Author Nipun Jaswal
Take your penetration testing and IT security skills to a whole new level with the secrets of MetasploitAbout This BookGain the skills to carry out penetration testing in complex and highly-secured environmentsBecome a master using the Metasploit framework, develop....
Release Date 2016/09 -
Advanced Infrastructure Penetration Testing
Author Chiheb Chebbi
A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructureAbout This BookAdvanced exploitation techniques to breach modern operating systems and complex network....
Release Date 2018/02 -
Mobile Application Penetration Testing
Author Vijay Kumar Velu
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter themAbout This BookGain insights into the current threat landscape of mobile applications in particularExplore the different options that are available on mobile platforms and ....
Release Date 2016/03 -
Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition
Author Gerard Johansen
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!About This BookGet a rock-solid insight into penetration testing techniques and test your corporate network against threats like never beforeFormulate your p....
Release Date 2016/09 -
Author Jason Beltrame
Sharpen your pentesting skill in a bootcampAbout This BookGet practical demonstrations with in-depth explanations of complex security-related problemsFamiliarize yourself with the most common web vulnerabilitiesGet step-by-step guidance on managing testing results ....
Release Date 2017/06 -
Author Hussam Khrais
Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming languageAbout This BookComprehensive information on building a web application penetration testing framework using PythonMaster....
Release Date 2018/04 -
Social Development in Independent India
Author Muchkund Dubey , Rajiv Balakrishnan
Social Development in Independent India: Paths Tread and the Road Ahead provides an overview of social development in India in the past 60 years and also deals with the emerging issues in the 21st century. The book discusses how social development has acquired a glo....
Release Date 2007/10 -
Social Engineering in IT Security: Tools, Tactics, and Techniques
Author Sharon Conheady
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to att....
Release Date 2014/08 -
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Author Kevin D. Mitnick , William L. Simon
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestsellingThe Art of DeceptionKevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malici....
Release Date 2005/03 -
Tissue Engineering, 2nd Edition
Author Jan De Boer , Clemens Van Blitterswijk
Tissue Engineering is a comprehensive introduction to the engineering and biological aspects of this critical subject. With contributions from internationally renowned authors, it provides a broad perspective on tissue engineering for students coming to the subject ....
Release Date 2014/12 -
Mining the Social Web, 2nd Edition
Author Matthew A. Russell
How can you tap into the wealth of social web data to discover who’s making connections with whom, what they’re talking about, and where they’re located? With this expanded and thoroughly revised edition, you’ll learn how to acquire, analyze, and summarize data from....
Release Date 2013/10 -
Author Andrew Weir , Cindy Gordon
Social Roots traces the history of a fundamental economic shift that is underway. The shift is rooted in virtualization, a key innovation factor, but when combined with influence networks, the significance becomes transformative. The combined power of these dimensio....
Release Date 2014/09