-
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Author Marcus Pinto , Dafydd Stuttard
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in ....
Release Date 2007/10 -
The Laws of Lifetime Growth: Always Make Your Future Bigger than Your past
Author Catherine Nomura , Dan Sullivan
Growth is a fundamental human need, a desire that stems from a deep love of life and an urge to experience it fully. It gives us a feeling of accomplishment, satisfaction, meaning, and progress. Here, Dan Sullivan and Catherine Nomura offer ten simple laws that will....
Release Date 2007/10 -
Social Development in Independent India
Author Muchkund Dubey , Rajiv Balakrishnan
Social Development in Independent India: Paths Tread and the Road Ahead provides an overview of social development in India in the past 60 years and also deals with the emerging issues in the 21st century. The book discusses how social development has acquired a glo....
Release Date 2007/10 -
Force.com: Create and Run any Application, On Demand
Author Salesforce.com
Software as a Service (SaaS), also known as on-demand computing, is changing the landscape of information technology in a profound way. By replacing locally managed stacks of networking, hardware, and software resources with an Internet-based utility, this model has....
Release Date 2007/11 -
CISSP Certification All-in-One Exam Guide, Fourth Edition, 4th Edition
Author Shon Harris
All-in-One is All You NeedFully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this....
Release Date 2007/11 -
Network Security Assessment, 2nd Edition
Author Chris McNab
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model ....
Release Date 2007/11 -
The Business Analyst as Strategist
Author Kathleen B. Hass
An organization's ability to achieve strategic goals through programs and supporting projects depends on its ability to establish a future vision, set strategic goals, select the most valuable projects, and then execute flawlessly. Organizational strategic al....
Release Date 2007/12 -
Author Kimi Ziemski , Kathleen B. Hass , Richard VanderHorst , Lori Lindbergh
Become equipped with the principles, knowledge, practices, and tools need to assume a leadership role in an organization. From Analyst to Leader: Elevating the Role of the Business Analyst uncovers the unique challenges for the business analyst to transition from a....
Release Date 2007/12 -
Router Security Strategies: Securing IP Network Traffic Planes
Author David J. Smith - CCIE No. 1986 , Gregg Schudel - CCIE No. 9591
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced tech....
Release Date 2007/12 -
CCSP SNRS Quick Reference Sheets
Author Brandon James Carroll
As a final exam preparation tool, the CCSP SNRS Quick Reference provides a concise review of all objectives on the new CCSP SNRS exam (642-503). This digital Short Cut provides you with detailed, graphical-based information, highlighting only the key topics in cram-....
Release Date 2007/12 -
-
Author Mike Dulworth , Michael Dulworth
Networking is a critically important skill, but few people are aware of its power or know how to develop, maintain, and leverage networks over their lifetime. In The Connect Effect, Michael Dulworth reveals the surprising ways personal, professional, and virtua....
Release Date 2008/01 -
Hacking: The Art of Exploitation, 2nd Edition
Author Jon Erickson
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to reall....
Release Date 2008/01 -
Author Peter R. Garber
Ensure ethical behavior is part of your culture – starting at the executive level and cascading down through every area of your organization - with The Ethical Dilemma.Is ethics really good business? Absolutely, says author Peter Garber. He makes a strong business c....
Release Date 2008/01 -
The Open Source Alternative: Understanding Risks and Leveraging Opportunities
Author Heather J. Meeker
This book is a user manual for understanding and deployment of open source software licensing in business. Written for lawyers and businesspeople alike, it explains and analyzes open source licensing issues, and gives practical suggestions on how to deal with open s....
Release Date 2008/02 -
Author Sunil Wadhwa , Joe Kelly , Ken Draper , David Delcourt , Vik Davar , Stefan Brunner
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutio....
Release Date 2008/02 -
CISA® Certified Information Systems Auditor™ Study Guide, Second Edition
Author David L. Cannon
Prepare for CISA certification and improve your job skills with the training you'll receive in this valuable book. Covering the very latest version of the exam, it's packed with instruction on all exam content areas, including the most up-to-date regulations, IS a....
Release Date 2008/03 -
Verification of Systems and Circuits Using LOTOS, Petri Nets, and CCS
Author Rakefet Kol , Michael Yoeli
A Step-by-Step Guide to Verification of Digital SystemsThis practical book provides a step-by-step, interactive introduction to formal verification of systems and circuits. The book offers theoretical background and introduces the application of three powerful verif....
Release Date 2008/03 -
Federal IT Capital Planning and Investment Control (with CD)
Author Patricia A. Kelley , Thomas G. Kessler
Reduce risk and improve the overall performance of IT assets! Federal IT Capital Planning and Investment Control is the first book to provide a comprehensive look at the IT capital planning and investment control (CPIC) process. Written from a practitioner's ....
Release Date 2008/03 -
The Musician’s Legal Companion, Second Edition
Author Michael A. Aczon
Don't sign a recording contract before reading this book! The Musician's Legal Companion, Second Edition gets to the core of the legal issues you need to know about, in clear, straightforward language. Here you'll find easy-to-comprehend explanations of the four ....
Release Date 2008/03 -
Digital Storytelling, 2nd Edition
Author Carolyn Handler Miller
Equally useful for seasoned professionals and those new to the field, Carolyn Handler Miller covers effective techniques for creating compelling narratives for a wide variety of digital media. Written in a clear, non-technical style, it offers insights into the proc....
Release Date 2008/04 -
Author Zulfikar Ramzan , Markus Jakobsson
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a....
Release Date 2008/04 -
Author Joshua Porter
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the righ....
Release Date 2008/04 -
Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition
Author Ross J. Anderson
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better.....
Release Date 2008/04 -
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Author Daniel V. Hoffman
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps ha....
Release Date 2008/04 -
Web 2.0 Mash-ups and the New Aggregators
Author Martin Kelley
Web aggregators select and present content culled from multiple sources, playing an important taste-making and promotional role. Larger aggregators are starting to compete with mainstream news sources but a new class of niche and do-it-yourself aggregators are orga....
Release Date 2008/04 -
Application Security in the ISO27001 Environment
Author Anbalahan Siddharth , Pakala Sangit , Shetty Sachin , Ummer Firosh , Mangla Anoop , V
As conduits of critical business data, it's vital that your software packages are adequately secured. The de-facto standard on application security, this book is your step-by-step guide to securing your software applications within a best practice ISO/IEC 27001 and....
Release Date 2008/04 -
Selecting the Right NAP Architecture
Author Microsoft , Inc.
The objective of this guide is to provide a consistent structure for addressing the decisions and activities most critical to the successful implementation of the Microsoft® Network Access Protection (NAP) infrastructure. This guide includes several specific questio....
Release Date 2008/05 -
Software Security Engineering: A Guide for Project Managers
Author Nancy R. Mead , Gary McGraw , Robert J. Ellison , Sean Barnum , Julia H. Allen
“This book’s broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security t....
Release Date 2008/05 -
Corporate Governance in China: Research and Evaluation
Author Li Wei-An
Great progress has been achieved for the structural reform in China enterprises for the past one and a half decades. Along with the reform, the corporate governance structure has been established accordingly. The Chinese Corporate Governance Index (CCGI?NK) is a use....
Release Date 2008/05