-
Author Mati Aharoni , Devon Kearns , Jim O'Gorman , David Kennedy
"The best guide to the Metasploit Framework." ?HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network and system vulnerabilities. Metasploit: The Pen....
Release Date 2011/07 -
Author Steve Winterfeld , Jason Andress
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The ....
Release Date 2011/07 -
The Basics of Hacking and Penetration Testing
Author Patrick Engebretson
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience ....
Release Date 2011/07 -
Author Ashok Mohanty , Jibitesh Mishra
Software Engineering covers both function oriented as well as object oriented (OO) approach and emphasises on emerging areas such as 'web engineering', 'software maintenance' and 'component based software engineering'. This book further includes case studies o....
Release Date 2011/07 -
All-in-One CISA® Certified Information Systems Auditor: Exam Guide, Second Edition
Author Peter Gregory
"All-in-One is All You Need"The new edition of this trusted resource offers complete, up-to-date coverage of all the material included on the latest release of the Certified Information Systems Auditor exam. Written by an IT security and audit expert, CISA Certified....
Release Date 2011/08 -
The Law of Tax-Exempt Healthcare Organizations, 3rd Edition
Author Bruce R. Hopkins , Thomas K. Hyatt
Authoritative and entirely up to date to reflect recent changes in health law and tax-exempt law, The Law of Tax-Exempt Healthcare Organizations, Cumulative Supplement, Fourth Edition provides a comprehensive, one-volume source of detailed information on federal, st....
Release Date 2011/08 -
Chaos in Electric Drive Systems Analysis, Control and Application
Author ZHENG WANG , K.T. CHAU
In Chaos in Electric Drive Systems: Analysis, Control and Application authors Chau and Wang systematically introduce an emerging technology of electrical engineering that bridges abstract chaos theory and practical electric drives. The authors consolidate all import....
Release Date 2011/08 -
Corporate Governance, Fifth Edition
Author Nell Minow , Robert A. G. Monks
In the wake of the recent global financial collapse the timely new edition of this successful text provides students and business professionals with a welcome update of the key issues facing managers, boards of directors, investors, and shareholders.In addition to i....
Release Date 2011/08 -
Protect Your Wealth from the Ravages of Inflation: A Three-Step Method
Author Paul M. King
Protect Your Wealth from the Ravages of Inflation is for people who have financial assets to protect in an unpredictable, inflationary environment. Maybe you have tried traditional financial advice, financial planning, and passive investment management techniques an....
Release Date 2011/08 -
Author Becky Pinkard , Angela Orebaugh
Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, ....
Release Date 2011/08 -
Check Point NGX R65 Security Administration
Author Ralph Bonnell
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and ....
Release Date 2011/08 -
Penetration Tester's Open Source Toolkit, 3rd Edition
Author Jeremy Faircloth
Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes ha....
Release Date 2011/08 -
Managing Your Library and its Quality
Author Jarmo Saarti , Núria Balagué
This book, divided into two parts, provides an introduction to the quality management issues and gives a general overview to the use of ISO 9001 in the library environment. The second part presents the main features of ISO 9001:2008 with practical comments and examp....
Release Date 2011/08 -
Corporate Governance: Principles, Policies and Practices, 2nd Edition
Author A. C. Fernando
The second edition of A. C. Fernando's bestselling Corporate Governance: Principles, Policies and Practices sheds light on recent corporate problems using a flexible modular format, through a detailed explanation of the corporate governance mechanism and the variou....
Release Date 2011/08 -
Clients, Clients, and More Clients
Author Larina Kase
TURN EVERY BUSINESS CONNECTION INTO A PAYING CLIENTWith a Foreword by Michael Port, bestselling author of Book Yourself SolidClients, Clients, and More Clients arms you with powerful tools from the field of psychology for building every business connection into the ....
Release Date 2011/09 -
CEH Certified Ethical Hacker All-in-One Exam Guide
Author Matt Walker
Get complete coverage of all the objectives included on the EC-Council’s Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You’ll find learn....
Release Date 2011/09 -
The CERT® Oracle® Secure Coding Standard for Java™
Author David Svoboda , Dean F. Sutherland , Robert C. Seacord , Dhruv Mohindra , Fred Long
“In the Java world, security is not viewed as an add-on a feature. It is a pervasive way of thinking. Those who forget to think in a secure mindset end up in trouble. But just because the facilities are there doesn’t mean that security is assured automatically. A....
Release Date 2011/09 -
Author Michelle Tillis LEDERMAN
We all know that networking is important, and that forming relationships with others is a vital part of success. But sometimes it seems like networking removes all emotions from the equation and focuses only on immediate goals…whereas the kind of relation....
Release Date 2011/09 -
Author Joel Thomas Langill , Eric D. Knapp
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the securit....
Release Date 2011/09 -
Author Lawrence Costello , Ed Frauenheim , Laurie Bassi
Companies shirk taxes while padding profits.Firms foul the planet but keep raking in revenue.Reckless greed on Wall Street goes largely unpunished.More evidence that bad guys finish first in business?No. A different story is unfolding.Laurie Bassi and her coaut....
Release Date 2011/09 -
Compliance by Design: IT Controls that Work
Author Chong Ee
Reconsider how you view compliance – and your business will reap the rewards!A must have book for anyone who is looking to develop awareness and deeper insight into IT controls, strategies and techniques to solve compliance challenges!What does 'compliance' mean t....
Release Date 2011/09 -
BackTrack 5 Wireless Penetration Testing Beginner’s Guide
Author Vivek Ramachandran
Master bleeding edge wireless testing techniques with BackTrack 5.Learn Wireless Penetration Testing with the most recent version of BacktrackThe first and only book that covers wireless testing with BackTrackConcepts explained with step-by-step practical sessions a....
Release Date 2011/09 -
Author Karen Fredricks
Over 90 advanced recipes in this book and eBook for power users of Sage ACT! 2012 to increase the efficiency of businessesImmediately access ACT! 2012 with a full understanding of the Welcome screen and Navigation BarSegment your ACT! database into Groups and Compan....
Release Date 2011/09 -
Author Morgan Jones
Valve Amplifiers has been recognized as the most comprehensive guide to valve amplifier design, analysis, modification and maintenance. It provides a detailed presentation of the rudiments of electronics and valve design for engineers and non-experts. The source als....
Release Date 2011/10 -
Author Thomas L. Norman
Access Control Systems are difficult to learn and even harder to master due to the different ways in which manufacturers approach the subject and the myriad complications associated with doors, door frames, hardware, and electrified locks. Electronic Access Control ....
Release Date 2011/10 -
Author Tony Crescenzi
During the Great Depression, legendary British economist Keynes advocated using government money to fill the economic void until consumer spending and business investment recovered. But what happens when governments can't do that anymore? You've arrived at "The Ke....
Release Date 2011/10 -
CISSP® Practice: 2,250 Questions, Answers, and Explanations for Passing the Test
Author S. Rao Vallabhaneni
A must-have prep guide for taking the CISSP certification examIf practice does, indeed, make perfect, then this is the book you need to prepare for the CISSP certification exam! And while the six-hour exam may be grueling, the preparation for it doesn't have to be.....
Release Date 2011/10 -
Complex Systems and Systems of Systems Engineering
Author Jean-Luc Wippler , Jean-René Ruault , Dominique Luzeaux
With the growing maturity of information and communication technologies, systems have been interconnected within growing networks, yielding new services through a combination of the system functionalities. This leads to an increasing complexity that has to be manage....
Release Date 2011/10 -
Author David Uhlman , Fred Trotter
Ready to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requir....
Release Date 2011/10 -
The Enterprise Business Analyst
Author Kathleen B. Hass
Business Analysts: Chart Your Path to Success with Creative Solutions to Complex Business Problems!Business in the 21st century is rife with complexity. To leverage that complexity and guide an organization through these turbulent times, today's business anal....
Release Date 2011/10