-
Formation Control of Multiple Autonomous Vehicle Systems
Author Bo Zhu , Hugh H. T. Liu
This text explores formation control of vehicle systems and introduces three representative systems: space systems, aerial systems and robotic systemsFormation Control of Multiple Autonomous Vehicle Systems offers a review of the core concepts of dynamics and contr....
Release Date 2018/08 -
Reducing MTTD for High-Severity Incidents
Author Jordan Pritchard , Ramin Keene , Rodney Lester , Jay Holler , Michael Kehoe , Tammy B
For companies such as Amazon, Dropbox, and Gremlin, the term high severity incident (SEV) signifies drops in network availability, product feature issues, data loss, revenue loss, and security risks. These high-impact bugs occur when coding, automation, testing, an....
Release Date 2018/12 -
Author RJ Andrews
How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing.Creating Info We Trust is a craft that puts the world into forms tha....
Release Date 2019/01 -
Nonparametric Statistical Process Control
Author Marien Graham , Subhabrata Chakraborti
A unique approach to understanding the foundations of statistical quality control with a focus on the latest developments in nonparametric control charting methodologiesStatistical Process Control (SPC) methods have a long and successful history and have revolution....
Release Date 2019/04 -
Author Samuel F. Elder , Jennifer H. Elder
Protect your company’s finances in the event of a disaster In the face of an environmental or man-made disaster, it’s imperative to have a contingency plan that’s mapped out your corporation’s strategy to minimize the impact on the daily functions or life of the co....
Release Date 2019/04 -
Author Konstantin Kerekovski , Bal Mukund Sharma , Krishna Kumar K M , Nassyam Basha , YV R
Work with Oracle database’s high-availability and disaster-management technologies. This book covers all the Oracle high-availability technologies in one place and also discusses how you configure them in engineered systems and cloud services.You will see that when....
Release Date 2019/05 -
Protecting Your Web Applications
Author Ken Hess , Gary Sloper
Websites, applications, and online services are critical business assets, but these services are also among the most vulnerable to attack. When cyberthreats succeed, your company can quickly drop customers, lose revenue, and suffer brand damage. This practical eboo....
Release Date 2019/06 -
Waging Cyber War: Technical Challenges and Operational Constraints
Author Jacob G. Oakley
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....
Release Date 2019/08 -
Data Breaches: Crisis and Opportunity
Author Sherri Davidoff
Protect Your Organization Against Massive Data Breaches and Their ConsequencesData breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines ....
Release Date 2019/10 -
Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
Author Nihad A. Hassan
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, re....
Release Date 2019/11 -
Joint Ventures Involving Tax-Exempt Organizations, 4th Edition
Author Michael I. Sanders
Effective strategies for non-profit entities in a profit-based worldJoint Ventures Involving Tax-Exempt Organizations examines the procedures, rules, and regulations surrounding joint ventures and partnerships, emphasizing tax-exempt status preservation. Revised and ....
Release Date 2019/12 -
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Author David Both
Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.This book....
Release Date 2019/12 -
Author Ric Messier
With nation-states, organized crime groups, and other attackers scouring systems to steal funds, information, or intellectual property, incident response has become one of today’s most important technology sectors. If you’re not familiar with incident response, thi....
Release Date 2019/12 -
Author Steve Anson
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced atta....
Release Date 2020/01 -
Digital Forensics and Incident Response - Second Edition
Author Gerard Johansen
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident r....
Release Date 2020/01 -
Author Michael G. Rogers
Create loyal, engaged and results focused teams and organizations using a practical five-part servant leadership formula.Think of a world where people go to work completely engaged, are inspired to do more than they ever thought possible, remain 100% loyal to the teams an....
Release Date 2020/02 -
Author Eric C. Thompson
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecu....
Release Date 2020/02 -
Security Operations in Practice
Author Mike Sheward
This book walks you through how to establish and grow a strong security operations team, including hiring the right people, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a ....
Release Date 2020/02 -
Cyber Warfare - Truth, Tactics, and Strategies
Author Dr. Chase Cunningham , Gregory J. Touhill
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.Key FeaturesDefine and determine a cyber-defence strategy based on current and past ....
Release Date 2020/02 -
Author Heather E. McGowan , Chris Shipley , Thomas L. Friedma
A guide for individuals and organizations navigating the complex and ambiguous Future of WorkForeword by New York Times columnist and best-selling author Thomas L. FriedmanTechnology is changing work as we know it. Cultural norms are undergoing tectonic shifts. A global p....
Release Date 2020/04 -
Author Chris Brogan , Julien Smith
The 10th Anniversary Edition of Trust Agents helps companies get back on track in their efforts to build reputation, attention, and trust In the years since authors Chris Brogan and Julien Smith first released their groundbreaking book Trust Agents, social media....
Release Date 2020/07 -
Cyber Breach Response That Actually Works
Author Andrew Gorecki
You will be breached—the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But....
Release Date 2020/07 -
Author Scott Davis , Carter Copeland , Rob Wertheimer
Three top Wall Street analysts reveal enduring lessons in sustainable success from the great industrial titans—the high-tech companies of their day—to the disruptors that now dominate the economy.Before Silicon Valley disrupted the world with new technologies and business....
Release Date 2020/07 -
Author Tara Powers
Create a space for a healthy work–life balanceStay connected with Slack, Zoom, and Microsoft TeamsMaintain productivity and stay healthy and saneWorking from home is the new normalWorking from home was already on the rise, but when COVID-19 hijacked our reality, it became....
Release Date 2020/08 -
GCIH GIAC Certified Incident Handler All-in-One Exam Guide
Author Nick Mitropoulos
This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler examPrepare for the challenging GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation guide. Written by a reco....
Release Date 2020/08 -
Process Systems Engineering for Biofuels Development
A comprehensive overview of current developments and applications in biofuels production Process Systems Engineering for Biofuels Development brings together the latest and most cutting-edge research on the production of biofuels. As the first book specifically devoted to process syst.... -
Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
Author Omar Santos
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed, SOCs desperately need more qualified cybersecurity professionals. Cisco’s new Cisco Certifie....
Release Date 2020/11 -
Author Russell von Frank
Trust, it binds us together in our deepest most fulfilling relationships, attracts and retains the best employees, and turns clients into raving fans. Let me show you how to heal old wounds, become a sought out business leader to work for, and create a loyal following of ....
Release Date 2020/11