-
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Author Thomas J. Mowbray
A must-have, hands-on guide for working in the cybersecurity professionCybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as sy....
Release Date 2013/11 -
Data Analyst - BCS Guides to IT Roles
Author Obi Umegbolu , Clare Stanier , Charles Joseph , Harish Gulati , Rune Rasmussen
Data is constantly increasing; everything from app usage, to sales, to customer surveys generate data in an average business. Out on the streets data is everywhere too, from speed and security cameras, weather monitoring and measuring footfall to name just a few ex....
Release Date 2019/03 -
Author Donald D. Dunn
Executive leaders need a framework with which to evaluate current and to create new corporate ethical management systems in their organizations. This book offers such a framework, called the Moldable Model©, a system of consistent components that give leaders ....
Release Date 2016/05 -
E-Health Care Information Systems: An Introduction for Students and Professionals
Author Joseph Tan
E-Health Care Information Systems is a comprehensive collection written by leading experts from a range of disciplines including medicine, health sciences, engineering, business information systems, general science, and computing technology. This easily followed tex....
Release Date 2005/05 -
Eleventh Hour CISSP®, 3rd Edition
Author Joshua Feldman , Seth Misenar , Eric Conrad
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presente....
Release Date 2016/09 -
Author Ido Dubrawsky
Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; appl....
Release Date 2009/10 -
Author Mike Kleidermacher , David Kleidermacher
The ultimate resource for making embedded systems reliable, safe, and secureEmbedded Systems Security provides:A broad understanding of security principles, concerns, and technologiesProven techniques for the efficient development of safe and secure embedded softwar....
Release Date 2012/04 -
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Author Abdul Aslam , Chris K. Williams , Stanley G. Siegel , Scott E. Donaldson
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an e....
Release Date 2015/05 -
Entrepreneurship in the Gulf Cooperation Council
Author Alexandrina Maria Pauceanu
Entrepreneurship in the Gulf Cooperation Council: Entrepreneurship in the Gulf Cooperation Council promotes a practical approach to starting businesses, and is useful not only for students, but also to anyone seeking practical insights on the essential aspects of e....
Release Date 2016/08 -
Environmental Considerations Associated with Hydraulic Fracturing Operations
Author Stephen M. Testa , James A. Jacobs
A guide to environmental and communication issues related to fracking and the best approach to protect communities Environmental Considerations Associated with Hydraulic Fracturing Operations offers a much-needed resource that explores the complex challenges of fra....
Release Date 2019/04 -
Essential Cybersecurity Science
Author Josiah Dykstra
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to con....
Release Date 2015/12 -
Ethical Health Informatics, 3rd Edition
Author Harman
Ethical Informatics is an invaluable resource for HIM, the healthcare team (nursing, physical therapy, occupational therapy et al.), information technology (IT) students (associate, baccalaureate and graduate) and practitioners. Each chapter includes ethical “....
Release Date 2015/12 -
Exam Ref MS-500 Microsoft 365 Security Administration
Author Ed Fisher , Nate Chamberlain
Prepare for Microsoft Exam MS-500: Demonstrate your real-world knowledge of Microsoft 365 security implementation and administration, including identity, access, threat and information protection, governance, and compliance. Designed for professionals with Microsoft secur....
Release Date 2020/09 -
Fire Your Stock Analyst! Analyzing Stocks on Your Own
Author Harry Domash
In Fire Your Stock Analyst!, San Francisco Chronicle investment columnist Harry Domash presents a start-to-finish approach to stock selection that draws on winning techniques from the world's top money managers, uses readily available information, and is easy to im....
Release Date 2002/09 -
Author Kimi Ziemski , Kathleen B. Hass , Richard VanderHorst , Lori Lindbergh
Become equipped with the principles, knowledge, practices, and tools need to assume a leadership role in an organization. From Analyst to Leader: Elevating the Role of the Business Analyst uncovers the unique challenges for the business analyst to transition from a....
Release Date 2007/12 -
Fundamentals of Information Systems Security, 3rd Edition
Author Kim
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens w....
Release Date 2016/10 -
Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition
Author Stephen Sims , Ryan Linn , Branko Spasojevic , Jonathan Ness , Chris Eagle , Allen Ha
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker’s....
Release Date 2018/04 -
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition
Author Stephen Sims , Ryan Linn , Branko Spasojevic , Jonathan Ness , Chris Eagle , Allen Ha
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's....
Release Date 2015/01 -
GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Author Ric Messier
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Fully updated coverage of every topic on the current version of the GSEC exa....
Release Date 2019/08 -
Author Henry S. Warren
"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers of elegant hacks, it deserves ....
Release Date 2002/07 -
Author Roger A. Grimes
Meet the world's top ethical hackers and explore the tools of the tradeHacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms ....
Release Date 2017/05 -
Author Matthew Hickey , Jennifer Arcuri
A fast, hands-on introduction to offensive hacking techniquesHands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author....
Release Date 2020/09 -
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
Author Sean P. Murphy
HCISPP® HealthCare Information Security and Privacy Practitioner All-in-One Exam GuidePrepare for the current release of the HealthCare Information Security and Privacy Practitioner (HCISPP) exam using the detailed information contained in this effective self-study resour....
Release Date 2020/09 -
Healthcare Information Technology Exam Guide for CHTS and CAHIMS Certifications, 2nd Edition
Author John Mattison , Brian Gugerty , Kathleen A. McCormick
This effective study resource delivers complete coverage of all topics on the newest versions of these challenging HIT examsThis comprehensive self-study guide fully prepares candidates for the Certified Associate in Healthcare Information and Management Systems (C....
Release Date 2017/09 -
How Cybersecurity Really Works
You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out the jargon, giving you a broad view of how specific attacks work and common methods used by online adversarie.... -
How to Develop and Implement a Security Master Plan
Author Timothy Giles
Engage Stakeholders with a Long-Term SolutionThe goal: Convince executive management to "buy in" to your security program, support it, and provide the largest possible amount of funding.The solution: Develop a meticulously detailed long-term plan that sells decisio....
Release Date 2008/12 -
Information Security Auditor - Careers in information security
Author Wendy Goucher
Identifying security gaps in an organisation’s information systems is a first and vital step in protecting data and information. This is what makes the role of an information security (or assurance) auditor so important. However, this is a role that is often malign....
Release Date 2016/03 -
Information Security Management Principles, 3rd Edition
Author Andy Taylor , David Alexander , Amanda Finch , David Sutton
This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book support....
Release Date 2020/01 -
Author Dan Ablan
You hold in your hands the best-selling guide to NewTek's LightWave 3D animation software, completely updated for LightWave v9 by award-winning animator and trainer Dan Ablan. Rather than rehash the documentation like other books, this down-to-earth, easy-to-follow....
Release Date 2007/03