-
Service Desk and Incident Manager: Careers in IT service management
Author Peter Wheatcroft
The role of a service desk manager is to provide the single point of contact between an IT organisation and its users. Responsibilities include developing, implementing, monitoring and improving processes and procedures relating to the management of incidents and se....
Release Date 2014/07 -
Metasploit Penetration Testing Cookbook - Second Edition
Author Abhinav Singh , Monika Agarwal
Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it’s ideal for Metaspoilt veterans and newcomers alike.Special focus on the latest operating ....
Release Date 2013/10 -
Kali Linux Wireless Penetration Testing : Beginner's Guide
Author Vivek Ramachandran , Cameron Buchanan
Master wireless testing techniques to survey and attack wireless networks with Kali LinuxIn DetailAs wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The K....
Release Date 2015/03 -
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT
Author Robert E. Kress
Uncover the secrets of an award-winning IT function and apply them to your business!Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten year....
Release Date 2011/10 -
Penetration Testing: Protecting Networks and Systems
Author Kevin M. Henry
Preparation for the Certified Penetration Testing Engineer (CPTE) examination Penetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack. The Certifie....
Release Date 2012/06 -
Incident Response & Computer Forensics, 2nd Ed.
Author Chris Prosise , Kevin Mandia
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book s....
Release Date 2003/07 -
Author George Varghese
In designing a network device, you make dozens of decisions that affect the speed with which it will perform—sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other d....
Release Date 2004/12 -
Simple Steps to Data Encryption
Author Peter Loshin
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to b....
Release Date 2013/04 -
Author Stephen Trachtenberg , Susan R. Pierce
Revamp senior administration organization for more effective governanceGovernance Reconsidered: How Boards, Presidents, Administrators, and Faculty Can Help Their Colleges Thrive takes an in-depth look at the current practice of governance in higher education and ex....
Release Date 2014/05 -
Getting Started with OAuth 2.0
Author Ryan Boyd
Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data....
Release Date 2012/02 -
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Author David Maynor
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Test....
Release Date 2011/04 -
SOA Governance in Action: REST and Web Service Architectures
Author Jos Dirksen
SummarySOA Governance in Action is a hands-on guide for developers and technology leads who need to develop and implement policies for SOA projects. This book introduces the fundamentals of good governance, the best practices for implementing them, and how to suppor....
Release Date 2012/07 -
ISO 50001 Energy Management Systems
Author Johannes Kals
Managers and academia targeting energy performance improvements have a valuable tool in ISO 50001 Energy Management Systems, which allows for a certification after third-party audits. Business managers may reduce costs and fully tap the strategic potential ....
Release Date 2015/07 -
Learning iOS Penetration Testing
Author Swaroop Yermalkar
Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration testsAbout This BookAchieve your goal to secure iOS devices and applications with the help of this fast paced manualFind vulnerabilities in your iOS applications and fix them w....
Release Date 2016/01 -
Author Svetlana Ostrovskaya , Oleg Skulkin
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey FeaturesExplore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware detection using volatile memoryGet acquainted wi....
Release Date 2022/03 -
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Author Trevor Stuart , Joe Anich
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 DefenderKey FeaturesDetect, protect, investigate, and remediate threats using Microsoft Defender for endpointExpl....
Release Date 2022/03 -
Governance and Internal Controls for Cutting Edge IT
Author Karen F. Worstell
IT security risks are constantly changing, so how do we stay ahead? To remain competitive we rely on being early adopters of new technologies — but there are inherent risks. As we implement these technologies, how do we manage the risks without hindering the progres....
Release Date 2013/03 -
Digital Filmmaking, 2nd Edition
Author Natalie Phillips , Thomas Ohanian
Digital Filmmaking has been called the bible for professional filmmakers in the digital age. It details all of the procedural, creative, and technical aspects of pre-production, production, and post-production within a digital filmmaking environment. It exami....
Release Date 2013/04 -
Digital Storytelling, 2nd Edition
Author Carolyn Handler Miller
Equally useful for seasoned professionals and those new to the field, Carolyn Handler Miller covers effective techniques for creating compelling narratives for a wide variety of digital media. Written in a clear, non-technical style, it offers insights into the proc....
Release Date 2008/04 -
Sustainable Development and Governance in Europe
Author Thomas C. Hoerber , Pamela M. Barnes
This book analyses the evolution of the sustainability discourse in the European Union, exploring the conditions necessary for sustainable development to move from a conceptual model into a model for action for strategic decision makers at all levels of governance. ....
Release Date 2013/06 -
The Manager's Pocket Guide to Diversity Management
Author Dr. Edward E. Hubbard
This pocket guide will teach you the skills required to effectively manage a diverse workplace—not because it's the "right thing to do" or your organization requires it, but because it is good for business. Gain diversity awareness, tools, knowledge and techniques ....
Release Date 2004/01 -
Fuzzy Control and Identification
Author John H. Lilly
This book gives an introduction to basic fuzzy logic and Mamdani and Takagi-Sugeno fuzzy systems. The text shows how these can be used to control complex nonlinear engineering systems, while also also suggesting several approaches to modeling of complex engineering ....
Release Date 2010/12 -
IT's About Patient Care: Transforming Healthcare Information Technology the Cleveland Clinic Way
Author Gene Lazuta , Harris
A proven working model of healthcare IT as a transformative clinical and business engine—from one of the world’s leading healthcare organizationsExciting new technology is revolutionizing healthcare in the twenty-first century. This visionary guide by Cleveland Cli....
Release Date 2016/10 -
Social Evolution and Inclusive Fitness Theory
Author James A.R. Marshall
Social behavior has long puzzled evolutionary biologists, since the classical theory of natural selection maintains that individuals should not sacrifice their own fitness to affect that of others. Social Evolution and Inclusive Fitness Theory argues that a theory ....
Release Date 2015/04 -
Author Katie Cunningham
Get practical guidelines for making your website accessible to people with disabilities. With this handbook, you’ll learn how to design or develop a site that conforms to Section 508 of the US Rehabilitation Act—and in the process you’ll discover how to provide a be....
Release Date 2012/09 -
Understanding Government Contract Law
Author Terrance M. O'Connor
A “back-to-basics” guide to government contract lawFinally! A plain-English presentation of the basic legal concepts of government contract law for professionals at any stage in their careers.Until now, anyone in the procurement field has had to trudge through....
Release Date 2007/02 -
The Manager's Pocket Guide to Mega Thinking and Planning
Author Roger Kaufman
Our world is changing and changeable. Do you know where your organization is headed? Can you justify why you should go there? And provide the criteria for judging your progress and success? This pocket guide helps you through the process of creating a better future ....
Release Date 2011/01 -
Control of Non-conventional Synchronous Motors
Author Jean-Paul Louis
Classical synchronous motors are the most effective device to drive industrial production systems and robots with precision and rapidity. However, numerous applications require efficient controls in non-conventional situations. Firstly, this is the case with synchr....
Release Date 2012/01 -
Author LID Editorial
Who you know has always been as important as what you know, and social or business networks (that is, groups of people connecting together with a common interest) have existed since time began. Your connections can help with everything from business deals or career ....
Release Date 2014/06