-
Reflexive Governance for Research and Innovative Knowledge
Author Marc Maesschalck
The governance theories that have developed over the past twenty years offer a new framework to consider and examine the collective conditions of a “Responsible Research and Innovation – RRI” linked up with the policy challenges of a society in transition in all ....
Release Date 2017/03 -
Author Russell von Frank
Trust, it binds us together in our deepest most fulfilling relationships, attracts and retains the best employees, and turns clients into raving fans. Let me show you how to heal old wounds, become a sought out business leader to work for, and create a loyal following of ....
Release Date 2020/11 -
Outsourcing Dilemma: The Search for Competitiveness, The
Author J. Brian Heywood
Outsourcing of some business functions pre-dates the technological revolution of the latter part of the 20th century. Nevertheless, 99 percent of outsourcing would not be logical or necessary if it were not for the constantly changing and improving technology.Despit....
Release Date 2001/09 -
Healthcare Information Technology Exam Guide for CHTS and CAHIMS Certifications, 2nd Edition
Author John Mattison , Brian Gugerty , Kathleen A. McCormick
This effective study resource delivers complete coverage of all topics on the newest versions of these challenging HIT examsThis comprehensive self-study guide fully prepares candidates for the Certified Associate in Healthcare Information and Management Systems (C....
Release Date 2017/09 -
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501), 2nd Edition
Author Scott Jernigan , Mike Meyers
A fully updated CompTIA Security+ exam guide from training and exam preparation expert Mike MeyersTake the CompTIA Security+ exam (exam SY0-501) with confidence using the comprehensive information contained in this highly effective study resource. Like the exam, th....
Release Date 2017/12 -
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications
Author Sanjib Sinha
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your....
Release Date 2019/11 -
Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition
Author Shakeel Ali , Tedi Heriyanto , Lee Allen , Gerard Johansen , Damian Boodoo , Alex Sam
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth editionKey FeaturesRely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-....
Release Date 2018/10 -
Author Peter Yaworski
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbu....
Release Date 2019/06 -
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition, 4th Edition
Author Matt Walker
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Up-to-date coverage of every topic on the CEH v10 examThoroughly updated for....
Release Date 2019/03 -
Author Scar de Courcier , Oleg Skulkin
Maximize the power of Windows Forensics to perform highly effective forensic investigationsAbout This BookPrepare and perform investigations using powerful tools for Windows,Collect and validate evidence from suspects and computers and uncover clues that are otherw....
Release Date 2017/08 -
Network Protocols for Security Professionals
Author Yoram Orzach , Deepanshu Khanna
Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey FeaturesExploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database, DNS, voice, video, and collaboration server attac....
Release Date 2022/10 -
Nine Steps to Success: North American edition - An ISO 27001 Implementation Overview
Author Alan Calder
Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard....
Release Date 2017/10 -
Social Ontology of Whoness, 3rd Edition
Author Michael Eldred
How are core social phenomena to be understood as modes of being? This book offers an alternative approach to social ontology. Recent interest in social ontology on the part of mainstream philosophy and the social sciences presupposes from the outset that the human....
Release Date 2018/10 -
CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 2nd Edition
Author Matt Walker
Thoroughly revised for the latest release of the Certified Ethical Hacker (CEH) v8 certification examFully updated for the CEH v8 exam objectives, this comprehensive guide offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new editi....
Release Date 2014/04 -
Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
Author Jesus Vigo , Jr.
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that’s made of steel and won’t buckle when attacked!Ok, there’s no such thing as unhackable. No magic to....
Release Date 2022/12 -
Cybersecurity - Attack and Defense Strategies
Author Erdal Ozkaya , Yuri Diogenes
Enhance your organization's secure posture by improving your attack and defense strategiesAbout This BookGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.Learn to unique te....
Release Date 2018/01 -
Cisco Certified CyberOps Associate 200-201 Certification Guide
Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certificationKey FeaturesReceive expert guidance on how to kickstart your career in the cybersecurity industryGain hands-on experience while studying for the Cisco Certified CyberOps Associa.... -
CCNA Cybersecurity Operations Companion Guide, First Edition
Author Cisco Networking Academy
CCNA Cybersecurity Operations Companion Guide is the official supplemental textbook for the Cisco Networking Academy CCNA Cybersecurity Operations course.The course emphasizes real-world practical application, while providing opportunities for you to gain the skill....
Release Date 2018/06 -
Author James M. Stewart
Get the streamlined tool you need to bone up for the Security+ exam [SYO-101]. Fast Pass coverage includes:General security concepts.Assessing risk.Securing communications.Implementing wireless security features.Configuring a firewall.Detecting intrusions.Securing y....
Release Date 2004/10 -
CompTIA Linux+ Practice Tests, 2nd Edition
Author Steve Suehring
The best practice test preparation for the foundational CompTIA Linux+ certification examIf you’re preparing for this all-important exam, turn to CompTIA Linux+ Practice Tests. The book covers the 5 objective domains, PLUS one additional 90-question practice exam, ....
Release Date 2019/07 -
GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition, 2nd Edition
Author Ric Messier
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Fully updated coverage of every topic on the current version of the GSEC exa....
Release Date 2019/08 -
Governance of Portfolios, Programs, and Projects: A Practice Guide
Author Project Management Institute
Understanding governance as it applies to portfolios, programs, and projects is growing in importance to organizations, because appropriate governance is a factor in the success or failure of strategic initiatives and portfolios, as well as an organization’s ....
Release Date 2016/01 -
Author Robin Abernathy , Troy McMillan
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book.Learn, prepare, and practice for CISSP exam success with the CISSP Cert Guide from Pearson IT Certification, a lea....
Release Date 2013/11 -
Author Bryan E. Harkins , David A. Westcott , David D. Coleman
The most detailed, comprehensive coverage of CWSP-205 exam objectivesCWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objecti....
Release Date 2016/09 -
CompTIA Security+ Study Guide, 7th Edition
Author Chuck Easttom , Emmett Dulaney
Expert preparation covering 100% of Security+ exam SY0-501 objectivesCompTIA Security+ Study Guide, Seventh Edition offers invaluable preparation for Exam SY0-501. Written by an expert author team, this book covers 100% of the exam objectives with clear, concise ex....
Release Date 2017/10 -
Auditing IT Infrastructures for Compliance, 3rd Edition
Author Robert Johnson , Marty Weiss , Michael G. Solomon
The third edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how t....
Release Date 2022/10 -
Hands-On Application Penetration Testing with Burp Suite
Author Riyaz Ahemed Walikar , Dhruv Shah , Carlos A. Lozano
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilitiesKey FeaturesMaster the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intru....
Release Date 2019/02 -
CISSP Official (ISC)2 Practice Tests
Author David Seidl , Mike Chapple
Full-length practice tests covering all CISSP domains for the ultimate in exam prepThe CISSP Official (ISC)2 Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per dom....
Release Date 2016/07