-
Hacking Exposed Mobile Security Secrets & Solutions
Author Mike Price , John Steven , Scott Matsumoto , Swapnil Deshmukh , Sarath Geethakumar
Proven security tactics for today’s mobile apps,devices, and networks A great overview of the new threats created by mobile devices.The authors have heaps of experience in the topics and bring that to every chapter. Pro....
Release Date 2013/07 -
Social Engineering Penetration Testing
Author Richard Ackroyd , Andrew Mason , Gavin Watson
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and e....
Release Date 2014/04 -
Hacking and Penetration Testing with Low Power Devices
Author Philip Polstra
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a lapto....
Release Date 2014/09 -
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Author Ali Dehghantanha , Kim-Kwang Raymond Choo
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners an....
Release Date 2016/10 -
Author Robert Morgan , Jean-Louis Bravard
A focused, implementation-orientated, executive-level book on outsourcing by two globally known practitioners.The outsourcing market is booming, the total outsourcing market in EMA forecasts a $59 billion dollar growth between 2004 and 2007.Fills a fills a major gap....
Release Date 2009/01 -
Network Basics Companion Guide
Author Cisco Networking Academy
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.Using a top-down OSI model approach, the course introduces the architecture, structure, f....
Release Date 2013/12 -
Scenario-Focused Engineering: A toolbox for innovation and customer-centricity
Author Drew Fletcher , Austina De Bonte
Blend the art of innovation with the rigor of engineeringGreat technology alone is rarely sufficient to ensure a product’s success. Scenario-Focused Engineering is a customer-centric, iterative approach used to design and deliver the seamless experiences and emotion....
Release Date 2014/12 -
Photonic Sensing: Principles and Applications for Safety and Security Monitoring
Author Wojtek J. Bock , Gaozhi Xiao
A cutting-edge look at safety and security applications of photonic sensorsWith its many superior qualities, photonic sensing technology is increasingly used in early-detection and early-warning systems for biological hazards, structural flaws, and security threats.....
Release Date 2012/10 -
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition
Author Ted G. Lewis
"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)"The book is written as a student t....
Release Date 2014/11 -
Author Chad Udell
Discover the strategies, tools, and technologies necessary for developing successful mobile learning programsIn the modern, rapidly-expanding mobile learning environment, only clear guidelines and state-of-the-art technologies will stand up to the challenges that li....
Release Date 2014/10 -
The Official (ISC)2 Guide to the SSCP CBK, 3rd Edition
Author Steven Hernandez , Adam Gordon
The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is one of the most popular and ideal credential for those wanting to expand their security career and highlight their security skills. If you are looking to embark on the journey towards your (....
Release Date 2015/11 -
Elementary Information Security, 2nd Edition
Author Smith
An ideal text for introductory information security courses, the second edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cyber security and technology. Thoroughly updated with recently re....
Release Date 2015/02 -
The Future of Boards: Meeting the Governance Challenges of the Twenty-First Century
Author Jay Lorsch
Edited by Harvard Business School professor Jay W. Lorsch, the preeminent authority on corporate boards, this book gathers the leading voices from business and academia to address the challenges of governance in the 21st century.We are at a crucial juncture in the e....
Release Date 2012/07 -
Air and Missile Defense Systems Engineering
Author John B. Hoffman , Warren J. Boord
Air and Missile Defense Systems Engineering fills a need for those seeking insight into the design procedures of the air and missile defense system engineering process. Specifically aimed at policy planners, engineers, researchers, and consultants, it presents a ba....
Release Date 2016/04 -
Web Accessibility: Web Standards and Regulatory Compliance
Author Andrew Kirkpatrick , Patrick H. Lauke , Jim Thatcher , Shawn Lawton Henry , Cynthia
The power of the Web lies in the fact that anyone and everyone can access it, and this should also extend to users with disabilities. Accessibility is about making websites accessible to those with aural, visual, or physical disabilities, or rather, constructing web....
Release Date 2006/07 -
Author Ido Dubrawsky
Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; appl....
Release Date 2009/10 -
Digital Forensics for Legal Professionals
Author Lars Daniel , Larry Daniel
Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors’ years of experience in working with attorneys as digital forensics experts, common questions arise again....
Release Date 2011/10 -
Author Steven Bolt , Joe Fichera
Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a thorough and sy....
Release Date 2012/12 -
Author Esther Swilley
Do you know anyone who does not own a mobile device? Consumers use mobile devices not only for communicating but for shopping as well. Searching for product information, inquiring about services, comparing prices, and purchasing make-up are just some of the shoppin....
Release Date 2015/11 -
Information Security Auditor - Careers in information security
Author Wendy Goucher
Identifying security gaps in an organisation’s information systems is a first and vital step in protecting data and information. This is what makes the role of an information security (or assurance) auditor so important. However, this is a role that is often malign....
Release Date 2016/03 -
Kali Linux - An Ethical Hacker's Cookbook
Author Himanshu Sharma
Over 120 recipes to perform advanced penetration testing with Kali LinuxAbout This BookPractical recipes to conduct effective penetration testing using the powerful Kali LinuxLeverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities wi....
Release Date 2017/10 -
Incident Response with Threat Intelligence
Author Roberto Martínez
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligenceKey FeaturesUnderstand best practices for detecting, containing, and recovering from modern cyber threatsGet practical experience embracing incident response using intelli....
Release Date 2022/06 -
CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition
Author Julie Mehan
Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same – but the outcomes can be equally devastating. Each can cause s....
Release Date 2014/05 -
Author Karen Fredricks
Over 90 advanced recipes in this book and eBook for power users of Sage ACT! 2012 to increase the efficiency of businessesImmediately access ACT! 2012 with a full understanding of the Welcome screen and Navigation BarSegment your ACT! database into Groups and Compan....
Release Date 2011/09 -
Consumer Protection in E-Retailing in ASEAN
This book examines how consumers are protected on the online marketplace in the context of ASEAN countries.While many sectors have been badly affected by the COVID-19 pandemic, e-retailing is one of the booming sectors during this period. Actually, the e-retailing sector was already booming even bef.... -
Author S. K. Basu
Auditing is a multi-dimensional subject. The scope of auditing is not only restricted to financial audit under the Companies Act, but has also been extended to cost accounting aspects, managerial policies, operational efficiencies and system applications and audit u....
Release Date 2009/07 -
Control Systems Engineering, Second Edition
Author S. K. Bhattacharya
Control Systems Engineering is a comprehensive text designed to cover the complete syllabi of the subject offered at various engineering disciplines at the undergraduate level. The book begins with a discussion on open-loop and closed-loop control systems. The block....
Release Date 2008/11 -
Author Anton Chuvakin , Cyrus Peikari
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find ou....
Release Date 2004/01