-
VCP5-DT Official Cert Guide: VMware Certified Professional 5 - Desktop
Author Linus Bourque
The Publisher regrets that the companion CD/DVD content cannot be made available Online.The VCP5-DT Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizze....
Release Date 2013/08 -
The Essence of Software Engineering: Applying the SEMAT Kernel
Author Svante Lidman , Ian Spence , Paul E. McMahon , Pan-Wei Ng , Ivar Jacobson
SEMAT (Software Engineering Methods and Theory) is an international initiative designed to identify a common ground, or universal standard, for software engineering. It is supported by some of the most distinguished contributors to the field. Creating a simple langu....
Release Date 2013/01 -
Building Secure Software: How to Avoid Security Problems the Right Way
Author Gary McGraw , John Viega
Most organizations have a firewall, antivirus software, and intrusion detection systems, all of which are intended to keep attackers out. So why is computer security a bigger problem today than ever before? The answer is simple--bad software lies at the heart of all....
Release Date 2001/09 -
Author Chris Minnick , Eva Holland
Learn to code the fun way with nine real projects for true beginnersAdventures in Coding is written specifically for young people who want to learn how to code, but don't know where to begin. No experience? No problem! This book starts from the very beginning to t....
Release Date 2016/03 -
Author George Finney , John Kindervag
Implement Zero Trust initiatives efficiently and effectivelyIn Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Pr....
Release Date 2022/10 -
Author Jeff Saperstein , Hunter Hastings
Given the rapid technological, organizational, and structural changes that challenge conventional institutions and economies, what is the future of work? The authors propose a path to seize opportunity for the individual worker and entrepreneur, who can be newly in....
Release Date 2018/06 -
Next-Generation Video Coding and Streaming
Author Benny Bing
Reviews the new High Efficiency Video Coding (HEVC) standard and advancements in adaptive streaming technologies for use in broadband networks and the InternetThis book describes next-generation video coding and streaming technologies with a comparative assessment ....
Release Date 2015/10 -
CISM Certified Information Security Manager Practice Exams
Author Peter H. Gregory
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Don’t Let the Real Test Be Your First Test! Take the current version of the ....
Release Date 2019/07 -
Author Robert G. Werner , James A. Bach
The H-1B visa is the gateway for the world's best and brightest to live and work in the United States as IT professionals, engineers, scientists, professors, doctors, nurses, and researchers. How to Secure Your H-1B Visa guides employees and employers alike through....
Release Date 2013/01 -
Author Iqbal Muhardianto , Digit Oktavianto
Analyze malware using Cuckoo Sandbox Learn how to analyze malware in a straightforward way with minimum technical skillsUnderstand the risk of the rise of document-based malwareEnhance your malware analysis concepts through illustrations, tips and tricks, step-by-s....
Release Date 2013/10 -
CISSP in 21 Days - Second Edition
Author M. L. Srinivasan
Boost your confidence and get the competitive edge you need to crack the exam in just 21 days!About This BookDay-by-day plan to study and assimilate core concepts from CISSP CBKRevise and take a mock test at the end of every four chaptersA systematic study and revi....
Release Date 2016/06 -
Information Security Risk Management for ISO 27001/ISO 27002, third edition
Author Alan Calder , Steve Watkins
Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework f....
Release Date 2019/08 -
Author Mark D. Wolfinger
In an era where “buy and hold” investment strategies no longer work, investors desperately need portfolio protection. Fortunately, it’s available—in the form of options. In Why Trade Options? top trader and options instructor Mark D. Wolfinger shows how options can ....
Release Date 2012/01 -
Author Jean Claude Larreche
One of the most frequent challenges that managers and executives face today is: ‘How do I keep on growing and at the same time, make a profit?’ Based on the author’s extensive research on over 350 Fortune 1000 Firms, The Momentum Effect proves that the old method of....
Release Date 2013/09 -
CCNA® Cisco Certified Network Associate: Study Guide, Seventh Edition
Author Todd Lammle
Learn from the Best - Cisco Networking Authority Todd LammleWritten by Cisco networking authority Todd Lammle, this comprehensive guide has been completely updated to reflect the latest CCNA 640-802 exam. Todd's straightforward style provides lively examples, hands....
Release Date 2011/04 -
System Forensics, Investigation, and Response, 3rd Edition
Author Chuck Easttom
Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! System Forensics, Investigation, and Response, Third Edition examines the fundamentals concepts readers must know as they prepare for a career in the cutting-edge field of syste....
Release Date 2017/08 -
Author Helen Q Huang
Character Sketch outlines a theory of costume rendering that explores how a designer conceptualizes and creates a character on the page. Beginning with how to develop a sense of character through active, gestural poses, this book explores and explains the process o....
Release Date 2018/02 -
Author Christo Sims
In New York City in 2009, a new kind of public school opened its doors to its inaugural class of middle schoolers. Conceived by a team of game designers and progressive educational reformers and backed by prominent philanthropic foundations, it promised to reinvent....
Release Date 2017/03 -
Author Hillary Sanders , Joshua Saxe
"Security has become a ""big data"" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, ....
Release Date 2018/09 -
Securing Network Infrastructure
Author Sagar Rahalkar , Sairam Jetty
Plug the gaps in your network's infrastructure with resilient network security modelsKey FeaturesDevelop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement n....
Release Date 2019/03 -
How to Choose the Right Digital Leader for Your Company
Author Nikolaus Obwegeser , Michael Wade
Striking the right balance between competence and credibility is essential to digital leaders’ success, but it depends on what a company expects its CDO to do. While external candidates can bring critical digital competence and experience to organizations seeking a....
Release Date 2019/05 -
Google Hacking for Penetration Testers, 3rd Edition
Author Justin Brown , Bill Gardner , Johnny Long
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade sec....
Release Date 2015/11 -
CISSP For Dummies, 6th Edition
Author Peter H. Gregory , Lawrence C. Miller
Secure your CISSP certification!If you’re a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you'll need to pass....
Release Date 2018/06 -
Information Governance for Healthcare Professionals
Author Robert F. Smallwood
Like other critical organizational assets, information is a strategic asset that requires high level of oversight in order to be able to effectively use it for organizational decision-making, performance improvement, cost management, and risk mitigation.Adopting an....
Release Date 2018/09 -
Author Abhishek Hingnikar , Yvonne Wilson
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and t....
Release Date 2019/12 -
Unequal Protection, 2nd Edition
Author Thom Hartmann
Unequal taxes, unequal accountability for crime, unequal influence, unequal control of the media, unequal access to natural resources—corporations have gained these privileges and more by exploiting their legal status as persons. How did something so illogical ....
Release Date 2010/06 -
Network Security Hacks, 2nd Edition
Author Andrew Lockhart
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alar....
Release Date 2006/10 -
Developing the Next Generation of Enterprise Leaders
Author M. Ellen Peebles , Douglas Ready
A survey of top business executives from major international organizations found that 79% said it was extremely important to have leaders who act on behalf of the entire organization, not just their units. The rest said it was very important. Nearly 65% said they e....
Release Date 2015/10 -
CISSP All-in-One Exam Guide, Seventh Edition, 7th Edition
Author Fernando Maymi , Shon Harris
Completely revised and updated for the 2015 CISSP body of knowledge, this new edition by Fernando Maymì continues Shon Harris’s bestselling legacy, providing a comprehensive overhaul of the content that is the leading chosen resource for CISSP exam success, and has....
Release Date 2016/06 -
Author Babak Akhgar , Colin Pattinson , Mohammad Dastbaz
We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates t....
Release Date 2015/03