-
Nessus Network Auditing, 2nd Edition
Author Russ Rogers
The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth....
Release Date 2011/10 -
Digital Forensics for Legal Professionals
Author Lars Daniel , Larry Daniel
Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors’ years of experience in working with attorneys as digital forensics experts, common questions arise again....
Release Date 2011/10 -
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT
Author Robert E. Kress
Uncover the secrets of an award-winning IT function and apply them to your business!Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten year....
Release Date 2011/10 -
SSCP® Systems Security Certified Practitioner All-in-One Exam Guide
Author Darril Gibson
Get complete coverage of all the material on the Systems Security Certified Practitioner (SSCP) exam inside this comprehensive resource. Written by a leading IT security certification and training expert, this authoritative guide addresses all seven SSCP domains as ....
Release Date 2011/11 -
Author Vincent Liu , Bryan Sullivan
Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks.This....
Release Date 2011/11 -
Stability and Control of Large-Scale Dynamical Systems
Author Sergey G. Nersesov , Wassim M. Haddad
Modern complex large-scale dynamical systems exist in virtually every aspect of science and engineering, and are associated with a wide variety of physical, technological, environmental, and social phenomena, including aerospace, power, communications, and network s....
Release Date 2011/11 -
Beginning Blackberry 7 Development
Author Kevin Michaluk , Anthony Rizk , Dante Sarigumba , Robert Kao
Are you interested in creating BlackBerry apps using the latest BlackBerry 7 and BlackBerry Java Plug-in for Eclipse? Then this is the book for you. Beginning BlackBerry 7 Development offers a hands-on approach to learning how to build and deploy sophisticated Black....
Release Date 2011/11 -
Digital Painting, 37 Intermediate Tricks and Techniques
Author Gary Tonge
"Make the most of your digital artwork. State-of-the-art advice from Gary Tonge, one of the world’s leading digital art pros, covers every aspect of computer-generated art—from combining a range of source material into one cohesive image to adding super realistic ef....
Release Date 2011/11 -
Digital Painting, 37 Advanced Tricks and Techniques
Author Gary Tonge
"Make the most of your digital artwork. State-of-the-art advice from Gary Tonge, one of the world’s leading digital art pros, covers every aspect of computer-generated art—from combining a range of source material into one cohesive image to adding super realistic ef....
Release Date 2011/11 -
Author Tobias Klein
"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."–Felix 'FX' LindnerA Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world....
Release Date 2011/11 -
Coding for Penetration Testers
Author Ryan Linn , Jason Andress
Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It also provides a....
Release Date 2011/11 -
Super Freedom: Create a Worry-Free Financial Future in 6 Steps
Author Trish Power
Super Freedom is just that ? a guide for women to super. This guide has a strong, aspirational focus on whatsuperannuation can provide for women, regardless of their marital circumstances, age or even their currentsuperannuation balances. For women it?s not so much ....
Release Date 2011/11 -
Computer Security Fundamentals, Second Edition
Author William Easttom
Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing....
Release Date 2011/12 -
Inside Cyber Warfare, 2nd Edition
Author Jeffrey Carr
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how na....
Release Date 2011/12 -
Advanced Photovoltaic Installations
Author Balfour
Part of the Art and Science of Photovoltaics series The use of high-level, high-performing solar panel systems is quickly becoming a mainstream energy source. Advanced Photovoltaic Installations goes beyond the basics and provides readers with the knowledge they ne....
Release Date 2011/12 -
Network Security First-Step, Second Edition
Author Donald Stoddard , Thomas M. Thomas
Network Security first-stepSecond EditionTom Thomas and Donald StoddardYour first step into the world of network securityNo security experience requiredIncludes clear and easily understood explanationsMakes learning easyYour first step to network security begins her....
Release Date 2011/12 -
Songwriting Without Boundaries
Author Pat Pattison
Infuse your lyrics with sensory detail!Writing great song lyrics requires practice and discipline. Songwriting Without Boundaries will help you commit to routine practice through fun writing exercises. This unique collection of more than150 sense-bound prompts helps....
Release Date 2011/12 -
Author Dr Sabina Dosani , Infinite Ideas
Defeat depression tackles this greatly misunderstood condition head on with over 50 inspirational ideas from a psychiatrist who struggled with and overcame depression as a young adult. Defeat depression offers a real insight into the condition with practical, tried ....
Release Date 2011/12 -
Author Randall F. Trzeciak , Andrew P. Moore , Dawn M. Cappelli
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade sec....
Release Date 2012/01 -
Author Mark D. Wolfinger
In an era where “buy and hold” investment strategies no longer work, investors desperately need portfolio protection. Fortunately, it’s available—in the form of options. In Why Trade Options? top trader and options instructor Mark D. Wolfinger shows how options can ....
Release Date 2012/01 -
Author Behrooz Mashadi , David Crolla
The powertrain is at the heart of vehicle design; the engine – whether it is a conventional, hybrid or electric design – provides the motive power, which is then managed and controlled through the transmission and final drive components. The overall powertra....
Release Date 2012/01 -
Author Max Muller
Human resource law is a complex, confusing compilation of federal, state, county and city laws and ordinances cured in the crucible of the courtroom. The Legal Side of HR Practice leads human resources professionals, managers, supervisors, and students through the ....
Release Date 2012/01 -
Managing Complexity of Information Systems: The Value of Simplicity
Author Mederic Morel , Pirmin P. Lemberger
This book is about complexity in Information Systems (IS). The subject is addressed from both conceptual and applied perspectives. Concepts are drawn from information theory, industrial design and software engineering. Its content capitalizes on experiences gathered....
Release Date 2012/01 -
Control of Non-conventional Synchronous Motors
Author Jean-Paul Louis
Classical synchronous motors are the most effective device to drive industrial production systems and robots with precision and rapidity. However, numerous applications require efficient controls in non-conventional situations. Firstly, this is the case with synchr....
Release Date 2012/01 -
An Introduction to Hacking and Crimeware
Author Victoria Loewengart
Defend your business, protect your livelihood, safeguard your future.Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits ....
Release Date 2012/01 -
Express Learning: Cryptography and Network Security
Author ITL Education Solutions Limited
Express Learning is a series of books designed as quick reference guides to important undergraduate computer courses. The organized and accessible format of these books allows students to learn important concepts in an easy-to-understand, question-and-answer format.....
Release Date 2012/01 -
Introduction to Random Signals and Applied Kalman Filtering with Matlab Exercises, 4th Edition
Author Patrick Y. C. Hwang , Robert Grover Brown
The Fourth Edition to the Introduction of Random Signals and Applied Kalman Filtering is updated to cover innovations in the Kalman filter algorithm and the proliferation of Kalman filtering applications from the past decade. The text updates both the research advan....
Release Date 2012/02 -
CASP: CompTIA® Advanced Security Practitioner, Study Guide
Author Michael Gregg
Get Prepared for CompTIA Advanced Security Practitioner (CASP) ExamTargeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused....
Release Date 2012/02 -
Getting Started with OAuth 2.0
Author Ryan Boyd
Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data....
Release Date 2012/02 -
The Appropriations Law Answer Book
Author William G. Arnold
Avoid Violations of the Antideficiency Act!Antideficiency Act (ADA) violations within both the financial and audit communities are now at an all-time high. Violations often result from a lack of knowledge about what is and what is not permissible under the law....
Release Date 2012/02