-
The Law of Tax-Exempt Organizations, 12th Edition
Author Bruce R. Hopkins
Tax-exempt law explained, for lawyers and nonlawyers alikeThe Law of Tax-Exempt Organizations has, for decades, been the definitive single-volume source of legal information for nonprofit lawyers and managers alike. Author Bruce R. Hopkins is widely recognized as t....
Release Date 2019/03 -
CSSLP Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Author Daniel Paul Shoemaker , Wm. Arthur Conklin
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This self-study guide delivers 100% coverage of all domainsin the the CSSLP ....
Release Date 2019/03 -
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition, 4th Edition
Author Matt Walker
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Up-to-date coverage of every topic on the CEH v10 examThoroughly updated for....
Release Date 2019/03 -
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Author Mike O'Leary
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and....
Release Date 2019/03 -
Data Analyst - BCS Guides to IT Roles
Author Obi Umegbolu , Clare Stanier , Charles Joseph , Harish Gulati , Rune Rasmussen
Data is constantly increasing; everything from app usage, to sales, to customer surveys generate data in an average business. Out on the streets data is everywhere too, from speed and security cameras, weather monitoring and measuring footfall to name just a few ex....
Release Date 2019/03 -
Author Nipun Jaswal
Gain basic skills in network forensics and learn how to apply them effectively Key FeaturesInvestigate network threats with ease Practice forensics tasks such as intrusion detection, network analysis, and scanning Learn forensics investigation at the network levelB....
Release Date 2019/03 -
Kali Linux - An Ethical Hacker's Cookbook - Second Edition
Author Himanshu Sharma
Discover end-to-end penetration testing solutions to enhance your ethical hacking skillsKey FeaturesPractical recipes to conduct effective penetration testing using the latest version of Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to detect....
Release Date 2019/03 -
Securing Network Infrastructure
Author Sagar Rahalkar , Sairam Jetty
Plug the gaps in your network's infrastructure with resilient network security modelsKey FeaturesDevelop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement n....
Release Date 2019/03 -
Author Imke Köhler
There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat,....
Release Date 2019/03 -
Author Soren Kenner , Imran Rashid
Authors Imran Rashid and Soren Kenner have sparked an international debate by revealing the “mind hacks” Facebook, Apple, Google, and Instagram use to get you and your children hooked on their products. In Offline, they deliver an eye-opening research-based journey....
Release Date 2019/02 -
CASP+ CompTIA Advanced Security Practitioner Study Guide, 3rd Edition
Author Michael Gregg , Jeff T. Parker
Comprehensive coverage of the new CASP+ exam, with hands-on practice and interactive study toolsThe CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition, offers invaluable preparation for exam CAS-003. Covering 100 percent of the ex....
Release Date 2019/02 -
Digital Forensics Basics: A Practical Guide Using Windows OS
Author Nihad A. Hassan
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gat....
Release Date 2019/02 -
Author Roman Zabicki
Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basic....
Release Date 2019/02 -
Hands-On Application Penetration Testing with Burp Suite
Author Riyaz Ahemed Walikar , Dhruv Shah , Carlos A. Lozano
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilitiesKey FeaturesMaster the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intru....
Release Date 2019/02 -
Author Giulio D'Agostino
Conversations in Cyberspace is a collection of insights on the current state of security and privacy in the Internet world.The book contains a brief introduction to some of the most used open-source intelligence (OSINT) tools and a selection of interviews with some....
Release Date 2019/02 -
Author Dr. Michael J. Urick
Many assumed characteristics of generational groupings are actually “myths,” meaning that generational stereotypes are not accurate across all members of a generation.This book explores the Generation Myth by highlighting the complexity of the “generation” concept ....
Release Date 2019/02 -
Author Ron Taylor , Omar Santos
Learn, prepare, and practice for CompTIA Pentest+ PT0-001 exam success with this CompTIA Cert Guide from Pearson IT Certification, a leader in IT Certification.Master CompTIA Pentest+ PT0-001 exam topicsAssess your knowledge with chapter-ending quizzesReview key co....
Release Date 2019/01 -
Author RJ Andrews
How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing.Creating Info We Trust is a craft that puts the world into forms tha....
Release Date 2019/01 -
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests
Author David Seidl , Mike Chapple
Smarter, faster prep for the SSCP exam(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests is the only (ISC)2-endorsed set of questions for the SSCP exam. With SSCP certification, you will meet Department of Defense requirements for entry-lev....
Release Date 2019/01 -
ISO 14001 Step by Step - A Practical Guide
Author Naeem Sadiq , Asif Hayat Khan
Take the first steps to ISO 14001 certification with this practical overview. This easy-to-follow book provides practical advice and sample documents to help you understand how to achieve compliance with ISO 14001:2015, the international standard for an EMS (envir....
Release Date 2019/01 -
Author Adrian Pruteanu
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker.Key FeaturesBuilds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Exa....
Release Date 2019/01 -
Hands-On Penetration Testing with Python
Author Furqan Khan
Implement defensive techniques in your ecosystem successfully with PythonKey FeaturesIdentify and expose vulnerabilities in your infrastructure with Python Learn custom exploit development . Make robust and powerful cybersecurity tools with Python W....
Release Date 2019/01 -
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
Author Robert Beggs , Vijay Kumar Velu
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key FeaturesEmploy advanced pentesting techniques with Kali Linux to build highly secured systems Discover various stealth techniques to remain....
Release Date 2019/01 -
SHRM-CP/SHRM-SCP Certification All-in-One Exam Guide
Author William D. Kelly , William H. Truesdell , Dory Willer
Take the SHRM-Certified Professional (SHRM-CP) and SHRM-Senior Certified Professional (SHRM-SCP) exams with complete confidenceThis integrated exam preparation system delivers 100% coverage of all topics for both the SHRM-Certified Professional (SHRM-CP) and SHRM-S....
Release Date 2018/12 -
Author Lee Reiber
Master the tools and techniques of mobile forensic investigationsConduct mobile forensic investigations that are legal, ethical, and highly effective using the detailed information contained in this practical guide. Mobile Forensic Investigations: A Guide to Eviden....
Release Date 2018/12 -
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Author Maciej Machulak , Michael Schwartz
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate y....
Release Date 2018/12 -
Reducing MTTD for High-Severity Incidents
Author Jordan Pritchard , Ramin Keene , Rodney Lester , Jay Holler , Michael Kehoe , Tammy B
For companies such as Amazon, Dropbox, and Gremlin, the term high severity incident (SEV) signifies drops in network availability, product feature issues, data loss, revenue loss, and security risks. These high-impact bugs occur when coding, automation, testing, an....
Release Date 2018/12 -
Author Stanley Siegel , Chris Williams , Scott Donaldson
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and busine....
Release Date 2018/12 -
Author Vimal Kumar , Amartya Sen , Sanjay Madria
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It ....
Release Date 2018/12 -
Microsoft System Center Data Protection Manager Cookbook
Author Patrick Lownds , Charbel Nemnom
Over 60 recipes to achieve a robust and advanced backup and recovery solution leveraging SCDPM Key FeaturesAdapt to the modern data center design challenges and improve storage efficiency Effective recipes to help you create your own robust architectural designs S....
Release Date 2018/12