-
ISO27001 Assessments Without Tears
Author Steve G. Watkins
The audit process can be a daunting one as an auditor can direct questions at any employee within your organisation. Written in a clear plain style, this pocket guide offers a tried and tested briefing, and should be issued to staff in advance of the audit to help t....
Release Date 2007/03 -
Author Andrea Simmons
Understand the role of Information Security ManagersYour responsibilities as an information security manager are critical. Advising on protecting the organisation's assets, security and data systems, not to mention its reputation, are in your hands. A major securit....
Release Date 2012/08 -
Author Janos Gyerik
Primarily written for those who are new to version control systems, this easy-to-follow guide to Bazaar will quickly make you an expert. From basic principles to creating plugins – it’s all here.Gain an understanding of what version control is, and how you can benef....
Release Date 2013/06 -
MySpace Unraveled: A Parent’s Guide to Teen Social Networking from the Directors of BlogSafety.com
Author Anne Collier , Larry Magid
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience f....
Release Date 2006/08 -
Computer Forensics InfoSec Pro Guide
Author David Cowen
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Infor....
Release Date 2013/03 -
Being a Solo Librarian in Healthcare
Author Elizabeth C Burns
This book brings to light the current job responsibilities of the healthcare librarian, but at the same time reveals a dichotomy. In theory, advances in healthcare research promise better care and improved safety for patients. In practice, there are barriers that un....
Release Date 2015/05 -
Author Mary M. Somerville
By fostering principles of systems thinking and informed learning though an inclusive, participatory design process that advances information exchange, reflective dialogue, and knowledge creation, the Informed Systems Approach promotes conceptual change in workplace....
Release Date 2015/07 -
Author Josh Pauli
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system....
Release Date 2013/06 -
Getting Your Retirement Act Right
Author Trent Hamm
This Element is an excerpt from The Simple Dollar: How One Man Wiped Out His Debts and Achieved the Life of His Dreams (9780137054251) by Trent Hamm. Available in print and digital formats.Retirement: how to start imagining and planning your exciting “next act”!Reti....
Release Date 2010/07 -
Thinking Security: Stopping Next Year’s Hackers
Author Steven M. Bellovin
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re a....
Release Date 2015/11 -
Introduction to Digital Video, 2nd Edition
Author John Watkinson
Covers the essential fundamentals of digital video: from video principles, to conversion, compression, coding, interfaces and output. Written for television professionals needing to apply digital video systems, equipment and techniques to multimedia and /or di....
Release Date 2012/09 -
Protecting Your Company's Intellectual Property
Author Deborah E. Bouchoux
A company’s most valuable assets may not be physical. This book shows how to protect them without fences or security guards! You can’t touch it or feel it. Sometimes you can’t even see it. Yet, intellectual property continues to soar in value, comprising an increas....
Release Date 2006/02 -
Cyber Security Policy Guidebook
Author Joseph Weiss , Jeffrey Schmidt , Marcus H. Sachs , Paul Rohmeyer , Jason Healey , Jen
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers ....
Release Date 2012/04 -
The Antivirus Hacker's Handbook
Author Elias Bachaalany , Joxean Koret
Hack your antivirus software to stamp out future vulnerabilitiesThe Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future ....
Release Date 2015/09 -
Integrating Program Management and Systems Engineering
Author Eric Rebentisch
Integrate critical roles to improve overall performance in complex engineering projectsIntegrating Program Management and Systems Engineering shows how organizations can become more effective, more efficient, and more responsive, and enjoy better performance outcom....
Release Date 2017/02 -
Alice and Bob Learn Application Security
Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development.... -
Cyber Security and Network Security
Author Sabyasachi Pramanik , Debabrata Samanta , M. Vinay , Abhijit Guha
CYBER SECUTIRY AND NETWORK SECURITYWritten and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly....
Release Date 2022/04 -
Security Policies and Implementation Issues, 2nd Edition
Author Johnson
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies and Implementation Issues, Second Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational....
Release Date 2014/08 -
Author Brian O'Leary , Hugh McGuire
The rapid shakeup--from print to digital buying and reading--is a transitional phase, necessary in order to make the next jump, which is far bigger and more exciting: what happens when all books are truly digital, connected, ubiquitous. We're starting to have the i....
Release Date 2012/08 -
Feedback Control for Computer Systems
Author Philipp K. Janert
How can you take advantage of feedback control for enterprise programming? With this book, author Philipp K. Janert demonstrates how the same principles that govern cruise control in your car also apply to data center management and other enterprise systems. Through....
Release Date 2013/10 -
Applying Social Tools to Learning
Author Dave Wilkins
With social learning, the whole company is part of the learning and development team. This Infoline will show you how to strategically design effective and agile social learning strategies that address the unique needs of various learning initiatives. Learn about th....
Release Date 2012/04 -
Securing the Borderless Network: Security for the Web 2.0 World
Author Tom Gillis
Securing the Borderless Network: Security for the Web 2.0 WorldTom GillisSecuring the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applicationsToday’s new Web 2.0, virtualization, mobility, tele....
Release Date 2010/04 -
Check Point NGX R65 Security Administration
Author Ralph Bonnell
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and ....
Release Date 2011/08 -
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
Author Vijay Kumar Velu
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers.About This BookEmploy advanced pentesting techniques with Kali Linux to build highly-secured systemsGet to grips with various stealth techn....
Release Date 2017/06 -
OPNsense Beginner to Professional
Author Julio Cesar Bueno de Camargo
Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey FeaturesLearn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party plugins such as Nginx and SenseiGrasp hands-on exa....
Release Date 2022/06 -
Instant Penetration Testing: Setting Up a Test Lab How-to
Author Vyacheslav Fadyushin
Set up your own penetration testing lab, using practical and precise recipesLearn something new in an Instant! A short, fast, focused guide delivering immediate results.A concise and clear explanation of penetration testing, and how you can benefit from itUnderstand....
Release Date 2013/03 -
Author Henry S. Warren
"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers of elegant hacks, it deserves ....
Release Date 2002/07 -
Web 2.0: Principles and Best Practices
Author John Musser
Web 2.0 Principles and Best Practices
Release Date 2006/11 -
Deploying Zone-Based Firewalls
Author Ivan Pepelnjak
Deploying Zone-Based Firewalls (Digital Short Cut)Ivan PepelnjakISBN: 1-58705-310-1Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the groupi....
Release Date 2006/11