-
The Official (ISC)2 SSCP CBK Reference, 6th Edition
Author Mike Wills
The only official body of knowledge for SSCP—(ISC)2’s popular credential for hands-on security professionals—fully revised and updated 2021 SSCP Exam Outline.Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implem....
Release Date 2022/04 -
The Official Adobe Print Publishing Guide, Second Edition
Author Brian P. Lawler
THE KEY TO SUCCESSFUL PRINT PRODUCTION is an understanding of the entire workflow, from scanning and file creation through prepress and print production. Fully updated by author and publishing consultant Brian Lawler, The Official Adobe Print Publishing Guide, Secon....
Release Date 2005/10 -
The Official New Features Guide to Sybase ASE 15
Author Carrie King Taylor , Steve Bradley , Naresh Adurty , Brian Taylor
Sybase Adaptive Server Enterprise 15 is a high-performance, mission-critical database management system designed to meet the increasing demands of large databases and high-transaction volumes, while providing a cost-effective database management system. The Off....
Release Date 2010/11 -
The Oliver Wight Class A Standard for Business Excellence, 7th Edition
Author Oliver Wight International , Inc.
The Oliver Wight Class A Standard for Business Excellence is the definitive, comprehensive statement of excellence in business today. Oliver Wight’s Class A Standard is the accumulated practice and experience of Oliver Wight Consultants around the world. It reflect....
Release Date 2017/05 -
The Open Source Alternative: Understanding Risks and Leveraging Opportunities
Author Heather J. Meeker
This book is a user manual for understanding and deployment of open source software licensing in business. Written for lawyers and businesspeople alike, it explains and analyzes open source licensing issues, and gives practical suggestions on how to deal with open s....
Release Date 2008/02 -
Author Krisa Tailor
In The Patient Revolution, author Krisa Tailor—a noted expert in health care innovation and management—explores, through the lens of design thinking, how information technology will take health care into the experience economy. In the experience economy, patients w....
Release Date 2015/12 -
The PayPal Official Insider Guide to Internet Security: Spot scams and protect your online business
Author Michelle Savage
Technology moves fast. So do criminals. Cyber attacks hit large and small merchants alike, phishers and fraudsters seem to be everywhere, and identity theft is prevalent. But this is not the end of the world, and you can’t afford to hide in the closet. Your customer....
Release Date 2012/10 -
Author Charles Read
The Payroll Book is the only book that demystifies payroll with clear, concise, and real-world examples on how to tackle the process."The Payroll Book will be a valuable resource for the small business owner as well as for the entrepreneur planning a new venture. Thorough....
Release Date 2020/08 -
The Pocket Idiot's Guide™ To Surviving an Audit
Author Alan Friedfel , Rich Mintzer
An essential resource for coping with the taxing ordeal of being audited.The Pocket Idiot's Guide™ to Surviving an Audit presents all of the information a taxpayer needs to get through an audit in one piece, including:*What is an audit?*The summons*The interview*Ri....
Release Date 2010/03 -
The Pocket Idiot's Guide™ to the FairTax
Author Ken Clark
Keeping your job is job one.In recent years, the FairTax has gained a lot of attention, but for the vast majority of Americans, there's a sense that there's still too little unbiased information on which to make an informed decision. The Pocket Idiot's Guide™ to ....
Release Date 2010/02 -
The Pocket Lawyer for Filmmakers
Author Thomas A. Crowell
* You have an idea you want to pitch to a production company; how do you safeguard your concept?* There's a painting in the background of your independent film; is it necessary to clear the rights? * The screenplay you and a friend wrote gets optioned; how do....
Release Date 2012/10 -
The Practice of Network Security: Deployment Strategies for Production Environments
Author Allan CISSP Liska
Enterprise security for real netadmins in the real worldThis book shows how to secure an enterprise network in the real world--when you're on the front lines, constantly under attack, and you don't always get the support you need. Symantec security engineer and fo....
Release Date 2002/12 -
The Practitioner's Guide to POLCA
Author Rajan Suri
POLCA (Paired-cell Overlapping Loops of Cards with Authorization) is a card-based visual control system that manages the flow of jobs through the shop floor: at each operation, it controls which job should be worked on next to meet delivery targets. POLCA ensures t....
Release Date 2018/04 -
The Prompt Payment Act Answer Book
Author William G. Arnold
Find the Answers You Need to Comply with the Prompt Payment Act!It can be challenging for federal agencies to comply with the Prompt Payment Act. Although the basic rules are simple, they can be difficult to interpret and apply properly — until now. Designed a....
Release Date 2009/09 -
The Ransomware Threat Landscape
Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in p.... -
The Road to Recovery: How and Why Economic Policy Must Change
Author Andrew Smithers
Renowned economist Andrew Smithers offers prescriptive advice and economic theory on avoiding the next financial crisisIn The Road to Recovery, Andrew Smithers—one of a handful of respected economists to have accurately predicted the most recent global financial cri....
Release Date 2013/10 -
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2nd Edition
Author Blunden
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopti....
Release Date 2012/03 -
The Routledge Companion to Trust
Author Sim B. Sitkin , Ann-Marie I. Nienaber , Rosalind H. Searle
In recent years, trust has enjoyed increasing interest from a wide range of parties, including organizations, policymakers, and the media. Perennially linked to turbulence and scandals, the damaging and rebuilding of trust is a contemporary concern affecting all are....
Release Date 2018/03 -
The Scientification of Religion
Author Kocku von Stuckrad
The enigmatic relation between religion and science still presents a challenge to European societies and to ideas about what it means to be ‘modern.’ This book argues that European secularism, rather than pushing back religious truth claims, in fact has been religi....
Release Date 2014/05 -
Author Observer Foundation Observer Research Foundation
The Second Bush Presidency: Global Perspectives contains nine national perspectives on what a second Bush term portends for the world. Taken on one yardstick, five of the countries chosen (including the US) are members of the Security Council; using another, four ar....
Release Date 2006/10 -
Author Perry Carpenter , Kai Roer
Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture.The topic of security culture is mysterious and confusing to most leaders. But it doesn’t have to be. In The Security Culture Play....
Release Date 2022/04 -
Author Lisa Chen , Lisa Witter
Women are a huge, uniquely receptive but still underutilized audience for a whole range of social and political causes, not just “women's issues.” In The She Spot, Lisa Witter and Lisa Chen, top executives in the nation's largest public interest communication....
Release Date 2008/06 -
The Snowball Effect: Communication Techniques to Make You Unstoppable
Author Andy Bounds
The long-awaited follow-up to the international bestseller The Jelly EffectCommunication is supposed to cause something. That's the point of it. So, what do you want to achieve following your communication? Do you want someone to answer 'yes'? Do you want to impr....
Release Date 2013/03 -
Author Zaid Hassan
Current responses to our most pressing societal challenges—from poverty to ethnic conflict to climate change—are not working. These problems are incredibly dynamic and complex, involving an ever-shifting array of factors, actors, and circumstances. They demand a hig....
Release Date 2014/02 -
The Social Leader: Redefining Leadership for the Complex Social Age
Author Sudhanshu Palsule , Frank Guglielmo
Technology, global economics, and demographics are colluding to create workspaces that thrive on communities rather than hierarchies. Our industrial paradigm with its roots in the military is swiftly being replaced by a paradigm based on networks that are held toget....
Release Date 2014/09 -
The Tao of Network Security Monitoring Beyond Intrusion Detection
Author Richard Bejtlich
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners ....
Release Date 2004/07 -
Author Amy Sample Ward , Afua Bruce
Changing the way we use, develop, and fund technology for social change is possible, and it starts with you. The Tech That Comes Next: How Changemakers, Philanthropists, and Technologists Can Build an Equitable World outlines a vision of a more equitable and just world along with practical steps to ....
Release Date 2022/03