-
ISO 50001 Energy Management Systems
Author Johannes Kals
Managers and academia targeting energy performance improvements have a valuable tool in ISO 50001 Energy Management Systems, which allows for a certification after third-party audits. Business managers may reduce costs and fully tap the strategic potential ....
Release Date 2015/07 -
The Technological Entrepreneur’s Playbook
Author Ian Chaston
As exemplified by Apple and Google, maximizing the wealth of organizations involves what Joseph Schumpeter described as “creative destruction.” This occurs when scientific or technological breakthroughs lead to the launch of a radically new product or se....
Release Date 2017/05 -
Author Amr Sukkar
This book tries to support the elaboration and implementation of strategies and to foster SMEs and entrepreneurship development.Most of businesses fall within the category of start-up, small and medium size enterprises. Therefore, governments in part of their quest to reform the economy and related ....
Release Date 2022/08 -
Learning iOS Penetration Testing
Author Swaroop Yermalkar
Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration testsAbout This BookAchieve your goal to secure iOS devices and applications with the help of this fast paced manualFind vulnerabilities in your iOS applications and fix them w....
Release Date 2016/01 -
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Author Trevor Stuart , Joe Anich
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 DefenderKey FeaturesDetect, protect, investigate, and remediate threats using Microsoft Defender for endpointExpl....
Release Date 2022/03 -
Governance and Internal Controls for Cutting Edge IT
Author Karen F. Worstell
IT security risks are constantly changing, so how do we stay ahead? To remain competitive we rely on being early adopters of new technologies — but there are inherent risks. As we implement these technologies, how do we manage the risks without hindering the progres....
Release Date 2013/03 -
Digital Storytelling, 2nd Edition
Author Carolyn Handler Miller
Equally useful for seasoned professionals and those new to the field, Carolyn Handler Miller covers effective techniques for creating compelling narratives for a wide variety of digital media. Written in a clear, non-technical style, it offers insights into the proc....
Release Date 2008/04 -
Modeling and Control of Modern Electrical Energy Systems
Author Masoud Karimi-Ghartemani
Modeling and Control of Modern Electrical Energy SystemsA step-by-step approach to the modeling, analysis, and control of modern electronically controlled energy systemsIn Modeling and Control of Modern Electrical Energy Systems, distinguished researcher Dr. Masoud Karimi-Ghartemani delivers a compr....
Release Date 2022/08 -
Social Evolution and Inclusive Fitness Theory
Author James A.R. Marshall
Social behavior has long puzzled evolutionary biologists, since the classical theory of natural selection maintains that individuals should not sacrifice their own fitness to affect that of others. Social Evolution and Inclusive Fitness Theory argues that a theory ....
Release Date 2015/04 -
Author Dave Howard
When implemented correctly, release management can help ensure that quality is integrated throughout the development, implementation, and delivery of services, applications, and infrastructure. This holistic, total cost of ownership approach allows for higher levels....
Release Date 2016/04 -
Author Katie Cunningham
Get practical guidelines for making your website accessible to people with disabilities. With this handbook, you’ll learn how to design or develop a site that conforms to Section 508 of the US Rehabilitation Act—and in the process you’ll discover how to provide a be....
Release Date 2012/09 -
Author Le Nguyen Binh
With coherent mixing in the optical domain and processing in the digital domain, advanced receiving techniques employing ultra-high speed sampling rates have progressed tremendously over the last few years. These advances have brought coherent reception systems for ....
Release Date 2017/07 -
Author Lawrence E. Hughes
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required backgrou....
Release Date 2022/03 -
Understanding Government Contract Law
Author Terrance M. O'Connor
A “back-to-basics” guide to government contract lawFinally! A plain-English presentation of the basic legal concepts of government contract law for professionals at any stage in their careers.Until now, anyone in the procurement field has had to trudge through....
Release Date 2007/02 -
The Appropriations Law Answer Book
Author William G. Arnold
Avoid Violations of the Antideficiency Act!Antideficiency Act (ADA) violations within both the financial and audit communities are now at an all-time high. Violations often result from a lack of knowledge about what is and what is not permissible under the law....
Release Date 2012/02 -
Security Architect: Careers in information security
Author Jon Collins
Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies. They ensure ....
Release Date 2014/09 -
Mastering Windows Security and Hardening - Second Edition
Author Mark Dunkerley , Matt Tumbarello
A comprehensive guide to administering and protecting the latest Windows 11 and Windows server operating system from ongoing cyber threats using zero-trust security principlesKey FeaturesLearn to protect your Windows environment using zero-trust and a multi-layered security approachImplement securit....
Release Date 2022/08 -
Application Security in the ISO 27001:2013 Environment
Author Vinod Vasudevan
Web application security as part of an ISO 27001-compliant information security management system Web application vulnerabilities are a common point of intrusion for cyber criminals. As cybersecurity threats proliferate and attacks escalate, and as applications pl....
Release Date 2015/10 -
Mahara ePortfolios Beginner's Guide
Author Derrin Kent , Thomas Bell , Richard Hand
Create your own e-Portfolio and Communities of Interest within an Educational or Professional Organization with this book and ebook.A step-by-step approach that takes you through examples with ample screenshots and clear explanationsCreate, customize, and maintain....
Release Date 2012/07 -
Author James Forsythe , Burton Goldberg
Cancer rates continue to skyrocket, and the overall survival rate for Stage IV cancer patients in the United States is a grim 2.1 percent. Clearly, the extensive use of expensive, sometimes ineffective toxins in conventional oncology protocols is a failing strategy.....
Release Date 2012/05 -
Cisco Network Design Solutions for Small-Medium Businesses
Author Peter Rybaczyk
Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM.Design and implement effective network solutions by mastering the design proces....
Release Date 2004/08 -
Routledge Handbook of Constitutional Law
Author Cheryl Saunders , Thomas Fleiner , Mark Tushnet
The Routledge Handbook of Constitutional Law is an advanced level reference work which surveys the current state of constitutional law. Featuring new, specially commissioned papers by a range of leading scholars from around the world, it offers a comprehensive overv....
Release Date 2013/06 -
The Open Source Alternative: Understanding Risks and Leveraging Opportunities
Author Heather J. Meeker
This book is a user manual for understanding and deployment of open source software licensing in business. Written for lawyers and businesspeople alike, it explains and analyzes open source licensing issues, and gives practical suggestions on how to deal with open s....
Release Date 2008/02 -
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Author Daniel V. Hoffman
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps ha....
Release Date 2008/04 -
Stability and Control of Large-Scale Dynamical Systems
Author Sergey G. Nersesov , Wassim M. Haddad
Modern complex large-scale dynamical systems exist in virtually every aspect of science and engineering, and are associated with a wide variety of physical, technological, environmental, and social phenomena, including aerospace, power, communications, and network s....
Release Date 2011/11 -
Author Ray Tricker
This "hands on" book provides practical information on how to cost effectively set up an ISO 9001: 2000 compliant Quality Management System. The new ISO 9000:2000 family is an all-encompassing series of standards that lay down requirements for incorporating the mana....
Release Date 2013/06 -
Back to the Land: Arthurdale, FDR's New Deal, and the Costs of Economic Planning
Author C. J. Maloney
How New Deal economic policies played out in the small town of Arthurdale, West VirginiaToday, the U.S. government is again moving to embrace New Deal-like economic policies. While much has been written about the New Deal from a macro perspective, little has been wr....
Release Date 2013/12 -
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
Author Stephen Hilt , Kyle Wilhoit , Aaron Shbeeb , Bryan Singer , Clint Bodungen
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed wayThis practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to ....
Release Date 2016/09 -
Hacker Techniques, Tools, and Incident Handling, 2nd Edition
Author Oriyano
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes....
Release Date 2013/08