-
Author Michael E Cohen
Have you ever had to fill out and sign a PDF-based form? Or change the date on a PDF-based flyer? Comment on a document sent around your workplace as a PDF file? Scan a document to PDF and OCR the text? Smile's PDFpen 5 can perform these and many other PDF manipula....
Release Date 2010/10 -
The Truth About Computer Scams
Author Steve Weisman
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.What you must know about Internet scams: from phishing and Trojan horses to fake death threats!After installed on your computer, T....
Release Date 2010/11 -
Author Steve Weisman
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.Don’t be the easiest victim! Simple, practical ways to significantly reduce the chances that you’ll be scammed.There are things th....
Release Date 2010/11 -
Fundamentals of Information Systems Security
Author Michael G. Solomon , David Kim
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Fundamentals of Information System Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems....
Release Date 2010/11 -
Security Strategies in Windows Platforms and Applications
Author Michael G. Solomon
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! More than 90 percent of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks aga....
Release Date 2010/11 -
CompTIA Security+ SY0-201 Cert Guide
Author David L. Prowse
CompTIA® Security+ SY0-201 Cert GuideDavid L. ProwseDVD Features Complete Practice ExamMaster every topic on CompTIA’s new Security+ SY0-201 exam.Assess your knowledge and focus your learning.Get the practical workplace knowledge you need!Start-to-finish Security+ S....
Release Date 2010/11 -
The Official New Features Guide to Sybase ASE 15
Author Carrie King Taylor , Steve Bradley , Naresh Adurty , Brian Taylor
Sybase Adaptive Server Enterprise 15 is a high-performance, mission-critical database management system designed to meet the increasing demands of large databases and high-transaction volumes, while providing a cost-effective database management system. The Off....
Release Date 2010/11 -
Computer Incident Response and Product Security
Author Damir Rajnović
Learn how to build a Security Incident Response team with guidance from a leading SIRT from CiscoGain insight into the best practices of one of the foremost incident response teamsMaster your plan for building a SIRT (Security Incidence Response Team) with detailed ....
Release Date 2010/12 -
The Disaster Recovery Handbook, 2nd Edition
Author Lawrence WEBBER , Michael WALLACE
Terrorist attacks. Data assaults. Natural catastrophes. Disease outbreaks. Recent years have taught us that not only was 9/11 not just a single, horrible occurrence, but that events of many types can—and statistically will—hit organizations of every size....
Release Date 2010/12 -
Fuzzy Control and Identification
Author John H. Lilly
This book gives an introduction to basic fuzzy logic and Mamdani and Takagi-Sugeno fuzzy systems. The text shows how these can be used to control complex nonlinear engineering systems, while also also suggesting several approaches to modeling of complex engineering ....
Release Date 2010/12 -
Official (ISC)2 Guide to the SSCP CBK, 2nd Edition
Author Harold F. Tipton , J Dewar , R Anderson
The (ISC) Systems Security Certified Practitioner (SSCP ) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselli....
Release Date 2010/12 -
AAA Identity Management Security
Author Brandon J. Carroll , - CCIE #23837 , Premdeep Banga , - CCIE #21713 , Vivek Santuka
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACSAAA solutions are very frequently used by customers to provide secure access to devices and networksAAA solutions are difficult and confusing ....
Release Date 2010/12 -
Author Paul Kearney
Deploy information security across the businessKnowing about information security is not enough. You also have to deploy it across the business - which means convincing management of its importance. Learn how with this essential guide!Information technology plays a ....
Release Date 2010/12 -
Gray Hat Hacking The Ethical Hacker’s Handbook
Author Jonathan Ness , Chris Eagle , Shon Harris , Gideon Lenkey , Allen Harper , Terron Wil
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker'....
Release Date 2011/01 -
CCNP Security Firewall 642-617 Quick Reference
Author Andrew Mason
As a final exam preparation tool, the CCNP Security Firewall 642-617 Quick Reference provides a concise review of all objectives on the new CCNP Security Firewall exam (642-617). This eBook provides you with detailed, graphical-based information, highlighting only t....
Release Date 2011/01 -
CISSP®: Certified Information Systems Security Professional Study Guide, Fifth Edition
Author Mike Chapple , Ed Tittel , James Michael Stewart
Totally updated for 2011, here's the ultimate study guide for the CISSP examConsidered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive stu....
Release Date 2011/01 -
Advanced BlackBerry 6 Development
Author Chris King
BlackBerry devices and applications are selling by the millions. As a BlackBerry developer, you need an advanced skill set to successfully exploit the most compelling features of the platform. This book will help you develop that skill set and teach you how to creat....
Release Date 2011/01 -
The Manager's Pocket Guide to Mega Thinking and Planning
Author Roger Kaufman
Our world is changing and changeable. Do you know where your organization is headed? Can you justify why you should go there? And provide the criteria for judging your progress and success? This pocket guide helps you through the process of creating a better future ....
Release Date 2011/01 -
The Art of Successful Information Systems Outsourcing
Author David Gefen
This book is unique in that it does not simply discuss an author's practitioner experience or present a summary of academic research on what makes projects succeed. Rather, this book does not hide the real complexity of the issue and does not attempt to introduce t....
Release Date 2011/01 -
Principles of Microelectromechanical Systems
Author Ki Bang Lee
The building blocks of MEMS design through closed-form solutionsMicroelectromechanical Systems, or MEMS, is the technology of very small systems; it is found in everything from inkjet printers and cars to cell phones, digital cameras, and medical equipment. This boo....
Release Date 2011/02 -
Author Steve Schroeder
The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber Criminals provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. The materials presented offer a wealth of in....
Release Date 2011/02 -
Author Steven Bolt
XBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console — it streams movies, connects with social networking sites and chatrooms, transfer files, and more — it just may contain evide....
Release Date 2011/02 -
The Droid Pocket Guide: Ginormous knowledge, pocket-sized, Second Edition
Author Jason D. O’Grady
Here is your essential companion to the Android-powered Droid smartphone. The Droid Pocket Guide, Second Edition, steers you through how to:Set up and quickly start using your Droid smartphone.Make and receive calls and text messages.Send email and synchronize your ....
Release Date 2011/03 -
Internal Control of Fixed Assets: A Controller and Auditor's Guide
Author Alfred M. King
What's the big deal about fixed assets?If the PCAOB starts to review auditor work papers dealing with Property, Plant, and Equipment (PP&E) on a more intensive basis, will your organization be ready? What if fair value reporting for PP&E were required?As ti....
Release Date 2011/03 -
CISA® Certified Information Systems Auditor®: Study Guide, Third Edition
Author David Cannon
The industry-leading study guide for the CISA exam, fully updatedMore than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations....
Release Date 2011/03 -
Computer Forensics JumpStart, Second Edition
Author Diane Barrett , Neil Broom , Ed Tittel , K Rudolph , Michael G. Solomon
Essential reading for launching a career in computer forensicsInternet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer....
Release Date 2011/03 -
Author William Byers
In today's unpredictable and chaotic world, we look to science to provide certainty and answers--and often blame it when things go wrong. The Blind Spot reveals why our faith in scientific certainty is a dangerous illusion, and how only by embracing science's inhe....
Release Date 2011/03 -
Digital Forensics with Open Source Tools
Author Harlan Carvey , Cory Altheide
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems a....
Release Date 2011/03 -
Author Matt Williamson
This book is unique in its coverage of all the features of pfSense, empowering you to exploit the firewall's full potential. With clear instructions and detailed screenshots, it helps you configure even the most advanced features.Harness the power of pfSense's cor....
Release Date 2011/03 -
A Manager’s Guide to IT Law, 2nd Edition
Author Jeremy Newton , Jeremy Holt
This comprehensive guide for management professionals discusses the IT-related legal issues faced by businesses on a daily basis. Legal concepts and terminology are notoriously difficult for non-specialists, but this book explains in plain English the most relevant ....
Release Date 2011/03