-
Author Jeannine Wiest
If you have ever struggled with life’s many curve balls, whether a personal loss, a serious illness or a genuine challenge, you will want the tools and techniques offered by Jeannine. This is a truly empowering work that promises a new level of wellness and personal....
Release Date 2014/10 -
Implementing Digital Forensic Readiness, 2nd Edition
Author Jason Sachowski
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with....
Release Date 2019/05 -
CBAP®/CCBA™ Certified Business Analysis, Study Guide
Author Terri Wagner , Susan Weese
A must-have resource for anyone preparing for the version 2.0 of the CBAP examAs organizations look to streamline their production models, the need for qualified and certified business analysts is growing. The Certified Business Analyst Professional (CBAP) certifica....
Release Date 2011/05 -
Author William Puech
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveilla....
Release Date 2022/07 -
Author Cesar Bravo , Darren Kitchen
An immersive learning experience enhanced with technical, hands-on labs to understand the concepts, methods, tools, platforms, and systems required to master the art of cybersecurityKey FeaturesGet hold of the best defensive security strategies and toolsDevelop a defensive security strategy at an en....
Release Date 2022/01 -
Incident Response Techniques for Ransomware Attacks
Author Oleg Skulkin
Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and toolsKey FeaturesUnderstand modern human-operated cyber attacks, focusing on threat actor tactic....
Release Date 2022/04 -
Human Rights, Democracy and Governance
Author ActionAid Asia ActionAid International Asia
Human Rights, Democracy and Governance is one of the volumes of the series titled, Imagine a New South Asia, presented by ActionAid International Asia. This volume emphasizes on unity in South Asia based on liberty and fraternity. It acknowledges that the countries ....
Release Date 2010/01 -
Author Hendrik Ebbers
Design and Deploy High-Performance JavaFX Controls Deliver state-of-the-art applications with visually stunning UIs. Mastering JavaFX 8 Controls provides clear instructions, detailed examples, and ready-to-use code samples. Find out how to work with the latest Java....
Release Date 2014/06 -
Author Paul Wheeler
High end digital cinematography can truly challenge the film camera in many of the technical, artistic and emotional aspects of what we think of as 'cinematography'. This book is a guide for practising and aspiring cinematographers and DOPs to digital cinema....
Release Date 2013/05 -
SCSP SNIA Certified Storage Professional All-in-One Exam Guide (Exam S10-110)
Author Eric Vanderburg
This effective self-study guide offers 100% coverage of the challenging SCSP SNIA Certified Storage Professional examGet complete coverage of all the SCSP exam objectives inside this comprehensive resource. Written by Eric Vanderburg, a leading expert on storage cer....
Release Date 2017/03 -
How Did I Not See This Coming?: A New Manager's Guide to Avoiding Total Disaster
Author Katy Tynan
Julie’s having a very bad day. She’s a new manager, and her top performer has resigned to escape her, and her own manager is looking on with a skeptical eye. . . . This is the story of her turnaround. Being a first-time manager is a tough job. If you ....
Release Date 2017/12 -
Cost Management and Control in Government
Author Dale Geiger
Government organizations spend enormous amounts of money. They employ a large percentage of the work force. They have an undeniably huge impact on the national economy and wealth. Yet they are, for the most part, unmanaged. What passes for management is a combinat....
Release Date 2011/06 -
Author Khosro S. Jahdi , Tom Cockburn
Evolving stories of governance and change are being written into the emerging custom and practice of all kinds of organizations today, whether they are global or domestic, startup or blue chip, corporate or government agency. Changing ways of ‘doing business’ are no....
Release Date 2015/01 -
Author George Varghese
In designing a network device, you make dozens of decisions that affect the speed with which it will perform—sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other d....
Release Date 2004/12 -
Local Governance and Poverty in Developing Nations
Author Isa Baud , Nicky Pouw
This volume examines the persistence of poverty - both rural and urban - in developing countries, and the response of local governments to the problem, exploring the roles of governments, NGOs, and CSOs in national and sub-national agenda-setting, policy-making, and....
Release Date 2013/06 -
The Lazy Fundamental Analyst: Applying quantitative techniques to fundamental stock analysis
Author Fred Piard
A simple, quick and effective approach to quantitative fundamental analysis The Lazy Fundamental Analyst presents a collection of strategies based on the application of quantitative analysis to fundamentals-based investing. It will appeal to anyone looking for....
Release Date 2014/10 -
Principles of Microelectromechanical Systems
Author Ki Bang Lee
The building blocks of MEMS design through closed-form solutionsMicroelectromechanical Systems, or MEMS, is the technology of very small systems; it is found in everything from inkjet printers and cars to cell phones, digital cameras, and medical equipment. This boo....
Release Date 2011/02 -
Author Richard Swedberg
A practical guide to the art of theorizing in the social sciencesIn the social sciences today, students are taught theory by reading and analyzing the works of Karl Marx, Max Weber, and other foundational figures of the discipline. What they rarely learn, however, ....
Release Date 2014/08 -
Author David Uhlman , Fred Trotter
Ready to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requir....
Release Date 2011/10 -
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will.... -
Author Jeff Bollinger , Brandon Enright , Matthew Valites
This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy,....
Release Date 2015/05 -
Network Security First-Step, Second Edition
Author Donald Stoddard , Thomas M. Thomas
Network Security first-stepSecond EditionTom Thomas and Donald StoddardYour first step into the world of network securityNo security experience requiredIncludes clear and easily understood explanationsMakes learning easyYour first step to network security begins her....
Release Date 2011/12 -
The Best Damn IT Security Management Book Period
Author Robert McCrie , Susan Snedaker
The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues fa....
Release Date 2011/04 -
Control of Non-conventional Synchronous Motors
Author Jean-Paul Louis
Classical synchronous motors are the most effective device to drive industrial production systems and robots with precision and rapidity. However, numerous applications require efficient controls in non-conventional situations. Firstly, this is the case with synchr....
Release Date 2012/01 -
Penetration Testing: Protecting Networks and Systems
Author Kevin M. Henry
Preparation for the Certified Penetration Testing Engineer (CPTE) examination Penetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack. The Certifie....
Release Date 2012/06 -
Designing Network Security Second Edition
Author Merike Kaeo
A practical guide to creating a secure network infrastructureUnderstand basic cryptography and security technologiesIdentify the threats and common attacks to a network infrastructureLearn how to create a security policyFind out how to recover from a security breach....
Release Date 2003/10 -
Identity and Access Management
Author Ertem Osmanoglu
Identity and Access Management: Business Performance Through Connected Intelligenceprovides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide i....
Release Date 2013/11 -
Get Clients Now! (TM), 3rd Edition
Author Jay Conrad Levinson , C.J. Hayden
Get Clients Now! has helped thousands of independent professionals dramatically increase their client base. With this uniquely practical guide, it’s easy to replace scattershot marketing and networking efforts with proven and targeted tactics. Using a sim....
Release Date 2013/05 -
Author Chris Peiris , Binil Pillai , Abbas Kudrati
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting prosIn Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Bi....
Release Date 2021/10 -
IT's About Patient Care: Transforming Healthcare Information Technology the Cleveland Clinic Way
Author Gene Lazuta , Harris
A proven working model of healthcare IT as a transformative clinical and business engine—from one of the world’s leading healthcare organizationsExciting new technology is revolutionizing healthcare in the twenty-first century. This visionary guide by Cleveland Cli....
Release Date 2016/10