-
Complete Audio Mastering: Practical Techniques
Author Gebre E. Waddell
Learn the art of professional audio mastering"Gebre Waddell covers this all-important subject in greater depth than has ever been done in a book." -- Dave Collins, mastering engineer for The Nightmare Before Christmas, Jurassic Park, Soundgarden, War, Ben Harper, an....
Release Date 2013/07 -
Industrial Network Security, 2nd Edition
Author Joel Thomas Langill , Eric D. Knapp
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you wi....
Release Date 2014/12 -
SOA Governance: Governing Shared Services On-Premise and in the Cloud
Author Filippos Santas , Chris Venable , Andre Tost , Leo Shuster , Robert Schneider , Rober
“Accenture sees this book as a milestone that will support the rationale behind selling and delivering SOA governance projects around the world.”--Dr. Matthias Ziegler, Accenture / Dr. Jure Zakotnik, Accenture / Thomas M. Michelbach, Accenture“We are using this book....
Release Date 2011/04 -
The Official Adobe Print Publishing Guide, Second Edition
Author Brian P. Lawler
THE KEY TO SUCCESSFUL PRINT PRODUCTION is an understanding of the entire workflow, from scanning and file creation through prepress and print production. Fully updated by author and publishing consultant Brian Lawler, The Official Adobe Print Publishing Guide, Secon....
Release Date 2005/10 -
Author Joshua Porter
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the righ....
Release Date 2008/04 -
CISSP® Practice: 2,250 Questions, Answers, and Explanations for Passing the Test
Author S. Rao Vallabhaneni
A must-have prep guide for taking the CISSP certification examIf practice does, indeed, make perfect, then this is the book you need to prepare for the CISSP certification exam! And while the six-hour exam may be grueling, the preparation for it doesn't have to be.....
Release Date 2011/10 -
The Mobile Application Hacker's Handbook
Author Dominic Chell , Tyrone Erasmus , Shaun Colley , Ollie Whitehouse
See your app through a hacker's eyes to find the real sources of vulnerabilityThe Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this boo....
Release Date 2015/02 -
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)), 6th Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This fully updated study guide covers every topic on the current version of the CompTIA Security+ examTake the .... -
Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), 3rd Edition
An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike Meyers Take the latest version of the CompTIA Security+ exam (exam SY0-601) with confidence using the comprehensive information contained in this highly effective self-study resource. Like the test, the guide go.... -
Ethical Hacking and Penetration Testing Guide
Author Rafay Baloch
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret ....
Release Date 2017/09 -
Official (ISC)2® Guide to the ISSMP® CBK®
Author Joseph Steinberg , Harold F. Tipton
As the recognized leader in the field of information security education and certification, the (ISC)2® promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Securi....
Release Date 2011/04 -
Protective Security: Creating Military-Grade Defenses for Your Digital Business
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-crit.... -
Top-Down Network Design, Third Edition
Author Priscilla Oppenheimer
Top-Down Network DesignThird EditionPriscilla OppenheimerA systems analysis approach to enterprise network designThe authoritative book on designing networks that align with business goalsTop-Down Network Design, Third Edition, is a practical and comprehensive guide....
Release Date 2010/08 -
The IT Regulatory and Standards Compliance Handbook
Author Craig S. Wright
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and t....
Release Date 2008/07 -
Malware Forensics Field Guide for Windows Systems
Author James M. Aquilina , Eoghan Casey , Cameron H. Malin
Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital ....
Release Date 2012/05 -
Information Security Management Principles, 3rd Edition
Author Andy Taylor , David Alexander , Amanda Finch , David Sutton
This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book support....
Release Date 2020/01 -
Author Nipun Jaswal
With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.In DetailThe Metasploit framework has been around f....
Release Date 2014/05 -
Managing Your Library and its Quality
Author Jarmo Saarti , Núria Balagué
This book, divided into two parts, provides an introduction to the quality management issues and gives a general overview to the use of ISO 9001 in the library environment. The second part presents the main features of ISO 9001:2008 with practical comments and examp....
Release Date 2011/08 -
Author Chris C. Ducker
Entrepreneurs often suffer from superhero syndromethe misconception that to be successful, they must do everything themselves. Not only are they the boss, but also the salesperson, HR manager, copywriter, operations manager, online marketing guru, and so much more. ....
Release Date 2014/04 -
-
Data Protection and Information Lifecycle Management
Author Tom Petrocelli
The Definitive Guide to Protecting Enterprise DataYour enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and prote....
Release Date 2005/09 -
Selecting the Right NAP Architecture
Author Microsoft , Inc.
The objective of this guide is to provide a consistent structure for addressing the decisions and activities most critical to the successful implementation of the Microsoft® Network Access Protection (NAP) infrastructure. This guide includes several specific questio....
Release Date 2008/05 -
Law Librarianship in Academic Libraries
Author Yemisi Dina
In the last two decades, advancement in technology has transformed every aspect of librarianship. Law Librarianship in Academic Law Libraries discusses issues and model practices in academic law libraries. This text will help librarians and library school students u....
Release Date 2015/04 -
Handbook of Digital Forensics and Investigation
Author Eoghan Casey
This completely revised reference work will concentrate on providing specific practical information in a well organized format. Each chapter will have a consistent structure, covering similar aspects of different systems when appropriate. In order to provide reade....
Release Date 2009/11 -
Author Raymond Choo , Ben Martini , Darren Quick
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation i....
Release Date 2013/11 -
Author Zhaoyu Pian , Xiangping Meng
Intelligent Coordinated Control of Complex Uncertain Systems for Power Distribution and Network Reliability discusses the important topics revolving around the control of complex uncertain systems using the intelligent coordination control mechanism, a topic ....
Release Date 2015/11 -
Estimation and Control of Large-Scale Networked Systems
Author Tao Li , Keyou You , Tong Zhou
Estimation and Control of Large Scale Networked Systems is the first book that systematically summarizes results on large-scale networked systems. In addition, the book also summarizes the most recent results on structure identification of a networked system, attac....
Release Date 2018/06 -
Solar Heating and Cooling Systems
Author Calin Sebarchievici , Ioan Sarbu
Solar Heating and Cooling Systems: Fundamentals, Experiments and Applications provides comprehensive coverage of this modern energy issue from both a scientific and technical level that is based on original research and the synthesis of consistent bibliographic mat....
Release Date 2016/10 -
Assemble the Social Web with zembly
Author Chris Webster , Todd Fast , Paul Anderson , Gail Anderson
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More! With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and....
Release Date 2008/12 -
Security Program and Policies: Principles and Practices, Second Edition
Author Sari Greene
Everything you need to know about information security programs and policies, in one bookClearly explains all facets of InfoSec program and policy planning, development, deployment, and managementThoroughly updated for today’s challenges, laws, regulations, and best....
Release Date 2014/03