-
Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)
Author Mike Meyers
An all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike MeyersIn Mike Meyers’ CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effect....
Release Date 2015/07 -
Hacking and Penetration Testing with Low Power Devices
Author Philip Polstra
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a lapto....
Release Date 2014/09 -
Author Justin Rainey , Timothy Virtue
The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC². The new HCISPP certification, focused on health care information security and privacy, is similar ....
Release Date 2014/12 -
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Author Ali Dehghantanha , Kim-Kwang Raymond Choo
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners an....
Release Date 2016/10 -
Getting Your Retirement Act Right
Author Trent Hamm
This Element is an excerpt from The Simple Dollar: How One Man Wiped Out His Debts and Achieved the Life of His Dreams (9780137054251) by Trent Hamm. Available in print and digital formats.Retirement: how to start imagining and planning your exciting “next act”!Reti....
Release Date 2010/07 -
Network Defense and Countermeasures: Principles and Practices, Second Edition
Author William Easttom II
Network Defense and Countermeasures:Principles and PracticesEverything you need to know about modern network attacks and defense, in one bookClearly explains core network security concepts, challenges, technologies, and skills Thoroughly updated for the latest attac....
Release Date 2013/10 -
Network Basics Companion Guide
Author Cisco Networking Academy
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.Using a top-down OSI model approach, the course introduces the architecture, structure, f....
Release Date 2013/12 -
The Effect of Temperature and other Factors on Plastics and Elastomers, 3rd Edition
Author Laurence W. McKeen
This reference guide brings together a wide range of critical data on the effect of temperature on plastics and elastomers, enabling engineers to make optimal material choices and design decisions. The effects of humidity level and strain rate on mechanical and elec....
Release Date 2014/04 -
Programming Mobile Devices: An Introduction for Practitioners
Author Tommi Mikkonen
With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems.Learn how to programme the mobile devices of the future!The importance of mobile systems programming has emerged over the recent years as a new domain in software development. The design of ....
Release Date 2007/03 -
Author Agnieszka Klus , John Bambenek
grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it....
Release Date 2009/01 -
Photonic Sensing: Principles and Applications for Safety and Security Monitoring
Author Wojtek J. Bock , Gaozhi Xiao
A cutting-edge look at safety and security applications of photonic sensorsWith its many superior qualities, photonic sensing technology is increasingly used in early-detection and early-warning systems for biological hazards, structural flaws, and security threats.....
Release Date 2012/10 -
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition
Author Ted G. Lewis
"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)"The book is written as a student t....
Release Date 2014/11 -
Sliding Mode Control of Uncertain Parameter-Switching Hybrid Systems
Author Xiaojie Su , Peng Shi , Ligang Wu
In control theory, sliding mode control (SMC) is a nonlinear control method that alters the dynamics of a nonlinear system by application of a discontinuous control signal that forces the system to slide along a cross-section of the system's normal behaviour. In re....
Release Date 2014/07 -
Author Chad Udell
Discover the strategies, tools, and technologies necessary for developing successful mobile learning programsIn the modern, rapidly-expanding mobile learning environment, only clear guidelines and state-of-the-art technologies will stand up to the challenges that li....
Release Date 2014/10 -
The Official (ISC)2 Guide to the SSCP CBK, 3rd Edition
Author Steven Hernandez , Adam Gordon
The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is one of the most popular and ideal credential for those wanting to expand their security career and highlight their security skills. If you are looking to embark on the journey towards your (....
Release Date 2015/11 -
Author Wil Allsopp
Build a better defense against motivated, organized, professional attacksAdvanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not....
Release Date 2017/03 -
Coding Interviews: Questions, Analysis & Solutions
Author Harry He
This book is about coding interview question of software and Internet companies. It covers five key factors which determine performance of candidates: (1) the basics of programming languages, data structures and algorithms, (2) approaches to writing code with high q....
Release Date 2012/12 -
Author Eric J Gruber
Like to build websites in the wild with your MacBook? This concise hands-on guide introduces you to the ideal editor: Coda 2. Rather than clutter your screen with shell access, a separate CSS editor, and a version control app, you’ll discover how Coda’s "one-window ....
Release Date 2013/01 -
Author Denny Cherry
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make r....
Release Date 2022/09 -
Author Chris Jackson - CCIE No. 6256
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.Cisco network security expert Chris Jackson begins with a thorough overview ....
Release Date 2010/06 -
Author Mati Aharoni , Devon Kearns , Jim O'Gorman , David Kennedy
"The best guide to the Metasploit Framework." ?HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network and system vulnerabilities. Metasploit: The Pen....
Release Date 2011/07 -
Unified Communications Forensics
Author Joseph II Shaw , Nicholas Mr. Grant
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by l....
Release Date 2013/10 -
Educating Social Entrepreneurs, Volume I
Author Maria Aggestam , Paul Miesing
Educating Social Entrepreneurs: From Idea Generation to Business Plan Formulation appears at a time of unprecedented environmental disasters, natural resources depletion, and significant failure of governments and global businesses to attend to worldwide social pro....
Release Date 2017/07 -
Author Todd Wade
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
Release Date 2022/06 -
Certified Information Security Manager Exam Prep Guide
Author Hemang Doshi
Pass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey FeaturesPass the CISM exam confidently with this step-by-step guideExplore practical solutions that validate your knowledge and expertise in managing enterprise information s....
Release Date 2021/11 -
Practical Threat Intelligence and Data-Driven Threat Hunting
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat h.... -
Author Matt Williamson
This book is unique in its coverage of all the features of pfSense, empowering you to exploit the firewall's full potential. With clear instructions and detailed screenshots, it helps you configure even the most advanced features.Harness the power of pfSense's cor....
Release Date 2011/03