-
Author Agnieszka Klus , John Bambenek
grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it....
Release Date 2009/01 -
How to Use Web 2.0 and Social Networking Sites Securely
Author IT Governance Research Team
This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.
Release Date 2009/01 -
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Author Jack B. Voth , Keatron Evans , Andrew Whitaker
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing themNowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve th....
Release Date 2009/02 -
Computer Security Handbook, Fifth Edition
Author M.E. KABAY , ERIC WHYNE , SEYMOUR BOSWORTH
The classic and authoritative reference in the field of computer security, now completely updated and revised.With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that....
Release Date 2009/02 -
Author Martin Nystrom , Chris Fry
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to mon....
Release Date 2009/02 -
Author Ryan Lindfield
CCSP SNAA Quick Reference (Digital Short Cut)Ryan LindfieldISBN-10: 1-58705-877-4ISBN-13: 978-1-58705-877-6As a final exam preparation tool, the CCSP SNAA Quick Reference provides a concise review of all objectives on the SNAA exam (642-515). This digital Short Cut ....
Release Date 2009/02 -
Author John Ross
Are the machines in your office living isolated lives? Do you have a few computers at home that you want to connect to each other and the Internet? The best way to share files on a group of computers is to create a network. But how do you do that?Network Know-How is....
Release Date 2009/02 -
How to Survive a Data Breach: A Pocket Guide
Author Stewart Mitchell
This handy pocket guide tells you what you need to do to prepare for a data breach. It explains the key measures you need to take to handle the situation and to minimise the damage. The information is drawn from various regulatory publications, and interviews with s....
Release Date 2009/02 -
Scanning Negatives and Slides, 2nd Edition
Author Sascha Steinhoff
Many photographers have either moved into digital photography exclusively or use both analog and digital media in their work. In either case, there is sure to be an archive of slides and negatives that cannot be directly integrated into the new digital workflow, nor....
Release Date 2009/02 -
Sociology and Social Anthropology in India
Author Yogesh Atal
The Indian Council of Social Science Research, the premier organization for social science research in India, conducts periodic surveys in the major disciplines of the social sciences to assess disciplinary developments as well as to identify gaps in research in ....
Release Date 2009/02 -
CISSP Exam Cram, Second Edition
Author Michael Gregg
Updated for 2009Covers the critical information you’ll need to know to score higher on your CISSP exam!Build and manage an effective, integrated security architectureSystematically protect your physical facilities and the IT resources they containImplement and admin....
Release Date 2009/03 -
Author Andrew Mason
As a final exam preparation tool, the CCSP SNRS Quick Reference provides a concise review of all objectives on the SNRS exam (642-504). This digital Short Cut provides you with detailed, graphical-based information, highlighting only the key topics in cram-style for....
Release Date 2009/03 -
Author Andy Oram , John Viega
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by....
Release Date 2009/04 -
Author Peter Krogh
One of the main concerns for digital photographers today is asset management: how to file, find, protect, and re-use their photos. The best solutions can be found in The DAM Book, our bestselling guide to managing digital images efficiently and effectively. Anyone w....
Release Date 2009/04 -
Unsolved Problems in Mathematical Systems and Control Theory
Author Vincent D. Blondel , Alexandre Megretski
This book provides clear presentations of more than sixty important unsolved problems in mathematical systems and control theory. Each of the problems included here is proposed by a leading expert and set forth in an accessible manner. Covering a wide range of areas....
Release Date 2009/04 -
The Definitive Guide to Plone, Second Edition
Author Andy McKay , Fabrizio Reale , Alice Narduzzo , Davide Moro , Maurizio Delmonte
The Definitive Guide to Plone, Second Edition has been completely updated to cover version 3 of Plone and its newest features. This book provides a complete and detailed overview of Plone. It is divided into three parts, which cover using, configuring, and developin....
Release Date 2009/04 -
Network Access Control For Dummies®
Author Denzil Wessels , Rich Campagna , Jay Kelley
Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, a....
Release Date 2009/05 -
Author Duane Nickull , Dion Hinchcliffe , James Governor
Web 2.0 is more pervasive than ever, with business analysts and technologists struggling to comprehend the opportunity it represents. So what exactly is Web 2.0 -- a marketing term or technical reality? This fascinating book finally puts substance behind the phenome....
Release Date 2009/05 -
The Complete Idiot's Guide to Business Law
Author Cara C. Putman
The only guide of its kind! Undergraduate college students working toward business degrees, MBA graduate students, and first year law students have one thing in common: they need to take courses in business law. Unlike cumbersome and expensive textbooks, The Comple....
Release Date 2009/05 -
Disappearing Cryptography, 3rd Edition
Author Peter Wayner
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integr....
Release Date 2009/06 -
Author Sean Power , Alistair Croll
Do you really understand your online presence? Are you confident that visitors can use your website? Do you know their motivations? How do online communities perceive your company? To innovate and adapt your business quickly, you must know the answers to these ques....
Release Date 2009/06 -
Author Patrice Bellagamba , Nash Darukhanawalla - CCIE No. 10332
As data centers grow in size and complexity, enterprises are adopting server virtualization technologies such as VMware, VMotion, NIC teaming, and server clustering to achieve increased efficiency of resources and to ensure business resilience. However, these techno....
Release Date 2009/06 -
CBAP Certified Business Analysis Professional All-in-One Exam Guide
Author Joseph Phillips
All-in-One is All You Need!Get complete coverage of all the material included on the International Institute of Business Analysis CBAP exam inside this comprehensive resource. Written by industry expert, trainer, and project management consultant Joseph Phillips, th....
Release Date 2009/07 -
Author Christian Collberg , Jasvir Nagra
“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.” —Mikhail Atallah, Distinguished Professor of Computer Sci....
Release Date 2009/07 -
Pro Business Activity Monitoring in BizTalk 2009
Author Geoff Snowman , Jeff Sanders
Business Activity Monitoring, or BAM, provides real-time business intelligence by capturing data as it flows through a business system. By using BAM, you can monitor a business process in real time and generate alerts when the process needs human intervention. Pro B....
Release Date 2009/07 -
Fundamentals of Computer Graphics, 3rd Edition
Author Steve Marschner , Michael Ashikhmin , Peter Shirley
With contributions by Michael Ashikhmin, Michael Gleicher, Naty Hoffman, Garrett Johnson, Tamara Munzner, Erik Reinhard, Kelvin Sung, William B. Thompson, Peter Willemsen, Brian Wyvill. The third edition of this widely adopted text gives students a comprehensive, fu....
Release Date 2009/07 -
Author Carol Stoner , Kate Grace MacElveen , Tom Bepler , Katherine Holt
As a trainer and educator, you may be looked to for information and leadership in driving a green initiative in your organization. This Infoline is designed to help trainers take personal and professional action to lead the green evolution. After talking about going....
Release Date 2009/07