-
Author Heather E. McGowan , Chris Shipley , Thomas L. Friedma
A guide for individuals and organizations navigating the complex and ambiguous Future of WorkForeword by New York Times columnist and best-selling author Thomas L. FriedmanTechnology is changing work as we know it. Cultural norms are undergoing tectonic shifts. A global p....
Release Date 2020/04 -
Author Michael G. Rogers
Create loyal, engaged and results focused teams and organizations using a practical five-part servant leadership formula.Think of a world where people go to work completely engaged, are inspired to do more than they ever thought possible, remain 100% loyal to the teams an....
Release Date 2020/02 -
Author Eric C. Thompson
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecu....
Release Date 2020/02 -
Security Operations in Practice
Author Mike Sheward
This book walks you through how to establish and grow a strong security operations team, including hiring the right people, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a ....
Release Date 2020/02 -
Cyber Warfare - Truth, Tactics, and Strategies
Author Dr. Chase Cunningham , Gregory J. Touhill
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.Key FeaturesDefine and determine a cyber-defence strategy based on current and past ....
Release Date 2020/02 -
Author Steve Anson
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced atta....
Release Date 2020/01 -
Digital Forensics and Incident Response - Second Edition
Author Gerard Johansen
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident r....
Release Date 2020/01 -
Joint Ventures Involving Tax-Exempt Organizations, 4th Edition
Author Michael I. Sanders
Effective strategies for non-profit entities in a profit-based worldJoint Ventures Involving Tax-Exempt Organizations examines the procedures, rules, and regulations surrounding joint ventures and partnerships, emphasizing tax-exempt status preservation. Revised and ....
Release Date 2019/12 -
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Author David Both
Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.This book....
Release Date 2019/12 -
Author Ric Messier
With nation-states, organized crime groups, and other attackers scouring systems to steal funds, information, or intellectual property, incident response has become one of today’s most important technology sectors. If you’re not familiar with incident response, thi....
Release Date 2019/12 -
Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
Author Nihad A. Hassan
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, re....
Release Date 2019/11 -
Data Breaches: Crisis and Opportunity
Author Sherri Davidoff
Protect Your Organization Against Massive Data Breaches and Their ConsequencesData breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines ....
Release Date 2019/10 -
Waging Cyber War: Technical Challenges and Operational Constraints
Author Jacob G. Oakley
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....
Release Date 2019/08 -
Protecting Your Web Applications
Author Ken Hess , Gary Sloper
Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical eboo....
Release Date 2019/06 -
Author Konstantin Kerekovski , Bal Mukund Sharma , Krishna Kumar K M , Nassyam Basha , YV R
Work with Oracle database’s high-availability and disaster-management technologies. This book covers all the Oracle high-availability technologies in one place and also discusses how you configure them in engineered systems and cloud services.You will see that when....
Release Date 2019/05 -
Nonparametric Statistical Process Control
Author Marien Graham , Subhabrata Chakraborti
A unique approach to understanding the foundations of statistical quality control with a focus on the latest developments in nonparametric control charting methodologiesStatistical Process Control (SPC) methods have a long and successful history and have revolution....
Release Date 2019/04 -
Author Samuel F. Elder , Jennifer H. Elder
Protect your company’s finances in the event of a disaster In the face of an environmental or man-made disaster, it’s imperative to have a contingency plan that’s mapped out your corporation’s strategy to minimize the impact on the daily functions or life of the co....
Release Date 2019/04 -
Author RJ Andrews
How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing.Creating Info We Trust is a craft that puts the world into forms tha....
Release Date 2019/01 -
Reducing MTTD for High-Severity Incidents
Author Jordan Pritchard , Ramin Keene , Rodney Lester , Jay Holler , Michael Kehoe , Tammy B
For companies such as Amazon, Dropbox, and Gremlin, the term high severity incident (SEV) signifies drops in network availability, product feature issues, data loss, revenue loss, and security risks. These high-impact bugs occur when coding, automation, testing, an....
Release Date 2018/12 -
Formation Control of Multiple Autonomous Vehicle Systems
Author Bo Zhu , Hugh H. T. Liu
This text explores formation control of vehicle systems and introduces three representative systems: space systems, aerial systems and robotic systemsFormation Control of Multiple Autonomous Vehicle Systems offers a review of the core concepts of dynamics and contr....
Release Date 2018/08 -
Hands-on Incident Response and Digital Forensics
Author Mike Sheward
Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as usual. Digital forensics is what follows - a scientific investigation into the causes o....
Release Date 2018/07 -
Estimation and Control of Large-Scale Networked Systems
Author Tao Li , Keyou You , Tong Zhou
Estimation and Control of Large Scale Networked Systems is the first book that systematically summarizes results on large-scale networked systems. In addition, the book also summarizes the most recent results on structure identification of a networked system, attac....
Release Date 2018/06 -
The Practitioner's Guide to POLCA
Author Rajan Suri
POLCA (Paired-cell Overlapping Loops of Cards with Authorization) is a card-based visual control system that manages the flow of jobs through the shop floor: at each operation, it controls which job should be worked on next to meet delivery targets. POLCA ensures t....
Release Date 2018/04 -
Trust Building and Boundary Spanning in Cross-Border Management
Author Michael Zhang
This edited book addresses two critical issues in international management: building trust and managing boundary spanning activities between international business partners. The duel-process of internationalization of multinational corporations (MNCs), through globalisati....
Release Date 2018/03 -
Author Wilson Bautista Jr.
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.About This BookIntelligence processes and procedures for response mechanismsMaster F3EAD to drive processes based on intelligenceThreat modeling and intelligent framewo....
Release Date 2018/03 -
Modeling and Modern Control of Wind Power
Author Yuanzhang Sun , Qiuwei Wu
An essential reference to the modeling techniques of wind turbine systems for the application of advanced control methodsThis book covers the modeling of wind power and application of modern control methods to the wind power control—specifically the models of type ....
Release Date 2018/02 -
Analytical Solutions for Two Ferromagnetic Nanoparticles Immersed in a Magnetic Field
Author Gehan Anthonys , Richard C. Dorf
The investigation of the behavior of ferromagnetic particles in an external magnetic field is important for use in a wide range of applications in magnetostatics problems, from biomedicine to engineering. To the best of the author's knowledge, the systematic analysis for....
Release Date 2018/02 -
Modelling Optimization and Control of Biomedical Systems
Author Eirini G. Velliou , Ioana Nascu , Efstratios N. Pistikopoulos
Shows the newest developments in the field of multi-parametric model predictive control and optimization and their application for drug delivery systems This book is based on the Modelling, Control and Optimization of Biomedical Systems (MOBILE) project, which was ....
Release Date 2018/01 -
The Disaster Recovery Handbook, 3rd Edition
Author Lawrence Webber , Michael Wallace
Expect the best. Plan for the worst.Survey the headlines: superstorms, data breaches, pandemics, system failures, and strikes occur regularly...somewhere. If a disaster hits your organization — will you be prepared? With the detailed guidance found in The Disaster ....
Release Date 2017/12