-
Advanced Modern Control System Theory and Design
Author Stanley M. Shinners
The definitive guide toadvanced control system designAdvanced Modern Control System Theory and Design offers the most comprehensive treatment of advanced control systems available today. Superbly organized and easy to use, this book is designed for an advanced cours....
Release Date 1998/09 -
Author Christopher Elisan
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting....
Release Date 2015/09 -
Advanced Infrastructure Penetration Testing
Author Chiheb Chebbi
A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructureAbout This BookAdvanced exploitation techniques to breach modern operating systems and complex network....
Release Date 2018/02 -
Advanced Electric Drives: Analysis, Control, and Modeling Using MATLAB/Simulink
Author Ned Mohan
With nearly two-thirds of global electricity consumed by electric motors, it should come as no surprise that their proper control represents appreciable energy savings. The efficient use of electric drives also has far-reaching applications in such areas as factory ....
Release Date 2014/08 -
Advanced CISSP Prep Guide: Exam Q&A
Author Russell Dean Vines , Ronald L. Krutz
Get ready to pass the CISSP exam and earn your certification with this advanced test guideUsed alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the hel....
Release Date 2002/10 -
Advanced BlackBerry 6 Development
Author Chris King
BlackBerry devices and applications are selling by the millions. As a BlackBerry developer, you need an advanced skill set to successfully exploit the most compelling features of the platform. This book will help you develop that skill set and teach you how to creat....
Release Date 2011/01 -
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
Author Prabath Siriwardena
AdvancedAPI Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs.API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business func....
Release Date 2014/08 -
Advanced API Security: OAuth 2.0 and Beyond
Author Prabath Siriwardena
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is conv....
Release Date 2019/12 -
Adobe® ColdFusion® Web Application Construction Kit: ColdFusion® 10 Enhancements and Improvements
Author Ben Forta
Adobe ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time—used by more ColdFusion developers to learn the product than any other books. ColdFusion 10 was built to make your applications safer, more scalable, and more powerf....
Release Date 2013/04 -
Adobe® ColdFusion® 9 Web Application Construction Kit, Volume 1: Getting Started
Author Charlie Arehart , Raymond Camden , Ben Forta
Written by the best known and most trusted name in the ColdFusion community, Ben Forta, The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time - the books that most ColdFusion developers used to learn the product. This Gett....
Release Date 2010/04 -
Adobe ColdFusion 8 Web Application Construction Kit, Volume 1: Getting Started
Author Charlie Arehart , Raymond Camden , Ben Forta
The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time—the books that most ColdFusion developers used to learn the product. This Getting Started volume starts with Web and Internet fundamentals and database concepts and des....
Release Date 2007/09 -
Author Ben Forta
Written by the best known and most trusted name in the ColdFusion community, Ben Forta, The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time. Volume 3: Advanced Application Development, focuses on application security, sc....
Release Date 2010/08 -
Author Tan
This book covers all the fundamental concepts of Health Management Information Systems (HMIS), provides relevant and current HMIS cases throughout, and touches on emerging technologies. Topics include: information systems from a managerial perspective; roles of cio....
Release Date 2010/03 -
Accountability: Angst, Awareness, Action
Author Jay P. Desai
This book was written to increase the public understanding of 'accountability'. The author constructs a three-dimensional lens with which he examines the mechanisms that hold our governance institutions accountable. Desai explains why a burst of governance reforms....
Release Date 2012/02 -
Author Katie Cunningham
Get practical guidelines for making your website accessible to people with disabilities. With this handbook, you’ll learn how to design or develop a site that conforms to Section 508 of the US Rehabilitation Act—and in the process you’ll discover how to provide a be....
Release Date 2012/09 -
Access Control, Authentication, and Public Key Infrastructure
Author Tricia Ballad , Bill Ballad , Erin Banks
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and pr....
Release Date 2010/10 -
Access Control and Identity Management, 3rd Edition
Author Mike Chapple
Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact acc....
Release Date 2020/10 -
AAA Identity Management Security
Author Brandon J. Carroll , - CCIE #23837 , Premdeep Banga , - CCIE #21713 , Vivek Santuka
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACSAAA solutions are very frequently used by customers to provide secure access to devices and networksAAA solutions are difficult and confusing ....
Release Date 2010/12 -
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
Author Madjid Nakhjiri , Mahsa Nakhjiri
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.AAA and Network Security for Mobile Access is an invalua....
Release Date 2005/10 -
Author M. K. Jabbi , Muchkund Dubey
At the tenth SAARC Summit, it was agreed that an inter-governmental social charter for South Asia under the aegis of SAARC would be prepared. In India, the Council for Social Development formulated the citizens' social charter. The development of the social char....
Release Date 2009/12 -
A Short Overview of Social Networks and Their Uses
Author Juliette Powell
This Element is an excerpt from 33 Million People in the Room: How to Create, Influence, and Run a Successful Business with Social Networking (9780137154357) by Juliette Powell. Available in print and digital formats.Profiling the world of social networks: what you ....
Release Date 2010/05 -
A Profile of the United States Toy Industry, Second Edition
Author Christopher Byrne
The toy industry is one of the most consistently misunderstood sectors of American business, comprising a wide range of businesses under one banner-entertainment, commodities, fashion and licensing-that each behave differently. Broad-based change is constant, with ....
Release Date 2017/01 -
A Primer on Corporate Governance, Second Edition
Author Cornelis A. de Kluyver
This long-awaited second edition book is a primer on corporate governance for large, publicly held companies in the United States—the system that defines the distribution of rights and responsibilities among different participants in a corporation, and spells out th....
Release Date 2013/05 -
A Primer on Corporate Governance
Author Fernando A. Tejerina-Gaite , Felix J. Lopez-Iturriaga
Spain has a civil law-based legal system, and court decisions are not a source of law but are of interpretative value. The privatization of large state-owned firms, liberalization, integration with the European Union, and the launch of the euro have all contributed ....
Release Date 2014/09 -
A Primer on Corporate Governance
Author Alessandro Zattoni , Andrea Melis
This book provides an understanding of the characteristics of corporate governance in Italy, one of the most developed countries in the world, symbol of the family capitalism. The text presents the main peculiarities of the Italian corporate governance system, its ....
Release Date 2017/06 -
A Practical Guide to Security Assessments
Author Sudhanshu Kairab
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this w....
Release Date 2004/09 -
A Practical Guide to Digital Forensics Investigations, 2nd Edition
Author Darren R. Hayes
THE DEFINITIVE GUIDE TO DIGITAL FORENSICSNOW THOROUGHLY UPDATED WITH NEW TECHNIQUES, TOOLS, AND SOLUTIONSComplete, practical coverage of both technical and investigative skillsThoroughly covers modern devices, networks, and the InternetAddresses online and lab investigati....
Release Date 2020/10 -
A Practical Guide to Computer Forensics Investigations
Author Darren R. Hayes
All you need to know to succeed in digital forensics: technicalandinvestigative skills, in one bookComplete, practical, and up-to-dateThoroughly covers digital forensics for Windows, Mac, mobile, hardware, and networksAddresses online and lab investigations, documen....
Release Date 2014/12 -
A Manager’s Guide to IT Law, 2nd Edition
Author Jeremy Newton , Jeremy Holt
This comprehensive guide for management professionals discusses the IT-related legal issues faced by businesses on a daily basis. Legal concepts and terminology are notoriously difficult for non-specialists, but this book explains in plain English the most relevant ....
Release Date 2011/03 -
A Guide to Effective Internal Management System Audits
Author Andrew Nichols
Are your internal audits adding value?Organizations hoping to comply with any of the International Standards for management systems (e.g. ISO9001, ISO27001) must carry out internal audits. However, the requirements set down by accreditation bodies for auditor course....
Release Date 2014/06