-
Software Engineering: A Methodical Approach
Author Elvis C. Foster
This text provides a comprehensive, but concise introduction to software engineering. It adopts a methodical approach to solving software engineering problems proven over several years of teaching, with outstanding results.The book covers concepts, principles, d....
Release Date 2014/12 -
Federal IT Capital Planning and Investment Control (with CD)
Author Patricia A. Kelley , Thomas G. Kessler
Reduce risk and improve the overall performance of IT assets! Federal IT Capital Planning and Investment Control is the first book to provide a comprehensive look at the IT capital planning and investment control (CPIC) process. Written from a practitioner's ....
Release Date 2008/03 -
Check Point NGX R65 Security Administration
Author Ralph Bonnell
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and ....
Release Date 2011/08 -
Author Massimo Bertaccini
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and....
Release Date 2022/03 -
Hack the Cybersecurity Interview
Author Ken Underhill , Christophe Foulon , Tia Hopkins , Mari Galloway
Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for cybersecurity job rolesPrepare for SOC analyst, penetra....
Release Date 2022/07 -
OPNsense Beginner to Professional
Author Julio Cesar Bueno de Camargo
Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey FeaturesLearn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party plugins such as Nginx and SenseiGrasp hands-on exa....
Release Date 2022/06 -
Agile Model-Based Systems Engineering Cookbook
Discover recipes for addressing the growing complexity of modern systems by applying agile methodologies and techniques in model-based systems engineering (MBSE)Key FeaturesLearn how Agile and MBSE can work iteratively and collaborate to overcome system complexityDevelop essential systems engineerin.... -
ISO27001 Assessments Without Tears
Author Steve G. Watkins
The audit process can be a daunting one as an auditor can direct questions at any employee within your organisation. Written in a clear plain style, this pocket guide offers a tried and tested briefing, and should be issued to staff in advance of the audit to help t....
Release Date 2007/03 -
Nmap 6: Network Exploration and Security Auditing Cookbook
Author Paulino Calderon Pale
Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth.Master the power of Nmap 6Learn how the Nmap S....
Release Date 2012/11 -
Author Henry S. Warren
"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers of elegant hacks, it deserves ....
Release Date 2002/07 -
Author Richard Enbody , Aditya Sood
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and....
Release Date 2014/04 -
Author Jayson E Street
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the worl....
Release Date 2015/07 -
Author Neal Allen
Network Maintenance and Troubleshooting GuideField-Tested Solutions for Everyday Problems, Second EditionNeal AllenThe 100% practical, real-world guide to anticipating, finding, and solving network problems—fast!Real-life networks don’t always behave “by the book.” ....
Release Date 2009/10 -
Author Alan Ferguson
Programme management is the coordinated organisation and implementation of a portfolio of projects and activities that help your business achieve its strategic objectives. Good programme management is the key to managing transformational change and, in today's busi....
Release Date 2014/06 -
Cyber Security and Network Security
Author Sabyasachi Pramanik , Debabrata Samanta , M. Vinay , Abhijit Guha
CYBER SECUTIRY AND NETWORK SECURITYWritten and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly....
Release Date 2022/04 -
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
Focused coverage of every topic on the current version of the CompTIA CySA+ examGet on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool. Inside, cybersecurity professional Bobby Rogers guides you on your career path, providing expert tips and sound advice .... -
Author William Byers
In today's unpredictable and chaotic world, we look to science to provide certainty and answers--and often blame it when things go wrong. The Blind Spot reveals why our faith in scientific certainty is a dangerous illusion, and how only by embracing science's inhe....
Release Date 2011/03 -
Author Gretchen Anderson
Designers of all stripes today are seeking social and civic projects that have a mission to serve the greater good at their core. Part of this growing trend stems from the desire to use skills for their highest potential. But the real payoff is the ability to use n....
Release Date 2015/06 -
Author Becky Livingston
Web 2.0 is transforming workplace learning in many ways. This Infoline is designed to introduce you to the many Web 2.0 technologies available and give you ideas about how to implement them in your organization and will help you identify various social networking op....
Release Date 2010/01 -
Business Continuity Management Systems - Implementation and certification to ISO 22301
Author Hilary Estall
This practical guide is written for organisations who are implementing a business continuity management system and certification in line with ISO 22301. It will prove invaluable for those new to business continuity management or to management systems. Enriched with....
Release Date 2012/09 -
Governance of IT - An executive guide to ISO/IEC 38500
Author A. L. Holt
Directors and government ministers across the world are increasingly being held accountable for failed IT systems, data loss and poor decisions about their organisation’s data. This valuable book is designed to bridge the gap between the governing body and CIOs/ IT ....
Release Date 2013/09 -
Learning Nessus for Penetration Testing
Author Himanshu Kumar
Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessmentIn DetailIT security is a vast and exciting domain, with vulnerability assessment and penet....
Release Date 2014/01 -
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Author Kevin Cardwell , Lee Allen
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environmentsAbout This BookLearn how to build your own pentesting lab environment to practice advanced techniquesCustomize your own scripts, and learn methods to exploit 32....
Release Date 2016/03 -
Author Ashok Mohanty , Jibitesh Mishra
Software Engineering covers both function oriented as well as object oriented (OO) approach and emphasises on emerging areas such as 'web engineering', 'software maintenance' and 'component based software engineering'. This book further includes case studies o....
Release Date 2011/07 -
Extending Your Business to Mobile Devices with IBM Worklight
Author Susan Hanson , Leonardo Olivera , Kearan McPherson , Christian Kirsch , Hossam Kator
The mobile industry is evolving rapidly. An increasing number of mobile devices, such as smartphones and tablets, are sold every year and more people are accessing services from a mobile device than ever before. For an enterprise, this can mean that a growing number....
Release Date 2013/08 -
Incident Response & Computer Forensics, Third Edition, 3rd Edition
Author Kevin Mandia , Matthew Pepe , Jason Luttgens
The definitive guide to incident response--updated for the first time in a decade!Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get ....
Release Date 2014/08 -
Author Will Gragido , Iain Davison , David DeSanto , John Pirc
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting....
Release Date 2016/05 -
Implementing Digital Forensic Readiness
Author Jason Sachowski
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organizati....
Release Date 2016/02 -
How to Become an International Disaster Volunteer
Author Michael Noone
How to Become an International Disaster Volunteer discusses the immense value an experienced water systems engineer, trauma surgeon, or communications specialist could bring to a disaster stricken community, while also explaining how their professional educations d....
Release Date 2017/02 -
Indoor Navigation Strategies for Aerial Autonomous Systems
Author Pedro Garcia Gil , Laura Elena Munoz Hernandez , Pedro Castillo-Garcia
Indoor Navigation Strategies for Aerial Autonomous Systems presents the necessary and sufficient theoretical basis for those interested in working in unmanned aerial vehicles, providing three different approaches to mathematically represent the dynamics of an aeria....
Release Date 2016/11