-
Taxation for Decision Makers, 2012 Edition
Author Karen A. Fortin , Shirley Dennis-Escoffier
The 2012 edition of this text has been completely updated for new legislation including the Tax Relief, Unemployment Insurance Reauthorization, and Job Creation Act of 2010, the Small Business Jobs Act, The Patient Protection and Affordable Care Act, and the Health ....
Release Date 2011/07 -
Teamwork Is an Individual Skill
Author Erin O. Murphy , Meri A. Walker , Christopher M. Avery
Knowing how to work effectively in and through groups may be the single most important skill anyone can develop in today's collaborative, team-based workplace. Unfortunately, all of the resources available on teamwork put the emphasis on group process and igno....
Release Date 2001/04 -
Author Stephen M.R. Covey , David A. Kaplan , Joel Peterson
Trust is the glue that holds an organization together. It turns deflection into transparency, suspicion into empowerment, and conflict into creativity. With it, a tiny company like John Deere grew into a worldwide leader. Without it, a giant corporation like Enron ....
Release Date 2016/05 -
Author Steve Cockram , Jeremie Kubicek
Become the leader others want to followForget everything you know about motivating others and building a harmonious workplace. If you want to get the best out of people, you must be willing to fight. But, that doesn't mean you become a dominator, nor does coddling....
Release Date 2019/03 -
Author Michelle Tillis LEDERMAN
We all know that networking is important, and that forming relationships with others is a vital part of success. But sometimes it seems like networking removes all emotions from the equation and focuses only on immediate goals…whereas the kind of relation....
Release Date 2011/09 -
Author Heather E. McGowan , Chris Shipley , Thomas L. Friedma
A guide for individuals and organizations navigating the complex and ambiguous Future of WorkForeword by New York Times columnist and best-selling author Thomas L. FriedmanTechnology is changing work as we know it. Cultural norms are undergoing tectonic shifts. A global p....
Release Date 2020/04 -
Author Jeannine Wiest
If you have ever struggled with life’s many curve balls, whether a personal loss, a serious illness or a genuine challenge, you will want the tools and techniques offered by Jeannine. This is a truly empowering work that promises a new level of wellness and personal....
Release Date 2014/10 -
The Antideficiency Act Answer Book
Author William G. Arnold
Avoid Violations of the Antideficiency Act!Antideficiency Act (ADA) violations within both the financial and audit communities are now at an all-time high. Violations often result from a lack of knowledge about what is and what is not permissible under the law....
Release Date 2009/09 -
The Antivirus Hacker's Handbook
Author Elias Bachaalany , Joxean Koret
Hack your antivirus software to stamp out future vulnerabilitiesThe Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future ....
Release Date 2015/09 -
The Appropriations Law Answer Book
Author William G. Arnold
Avoid Violations of the Antideficiency Act!Antideficiency Act (ADA) violations within both the financial and audit communities are now at an all-time high. Violations often result from a lack of knowledge about what is and what is not permissible under the law....
Release Date 2012/02 -
The Architectural Expression of Environmental Control Systems
Author George Baird
The Architectural Expression of Environmental Control Systems examines the way project teams can approach the design and expression of both active and passive environmental control systems in a more creative way. Using seminal case studies from around the world and ....
Release Date 2003/09 -
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Author Kevin D. Mitnick , William L. Simon
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestsellingThe Art of DeceptionKevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malici....
Release Date 2005/03 -
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Author Michael Hale Ligh , Andrew Case , Jamie Levy , AAron Walters
Memory forensics provides cutting edge technology to help investigate digital attacksMemory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malwa....
Release Date 2014/07 -
The Art of Network Penetration Testing
The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network. As you brute force passwords,.... -
Author Richard Swedberg
A practical guide to the art of theorizing in the social sciencesIn the social sciences today, students are taught theory by reading and analyzing the works of Karl Marx, Max Weber, and other foundational figures of the discipline. What they rarely learn, however, ....
Release Date 2014/08 -
The Art of Successful Information Systems Outsourcing
Author David Gefen
This book is unique in that it does not simply discuss an author's practitioner experience or present a summary of academic research on what makes projects succeed. Rather, this book does not hide the real complexity of the issue and does not attempt to introduce t....
Release Date 2011/01 -
Author Jason Andress , Steve Winterfeld
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive....
Release Date 2012/12 -
The Basics of Digital Forensics
Author John Sammons
The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to ....
Release Date 2012/04 -
The Basics of Digital Forensics, 2nd Edition
Author John Sammons
The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to per....
Release Date 2014/12 -
The Basics of Hacking and Penetration Testing
Author Patrick Engebretson
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience ....
Release Date 2011/07 -
The Basics of Hacking and Penetration Testing, 2nd Edition
Author Patrick Engebretson
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the result....
Release Date 2013/06 -
Author Josh Pauli
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system....
Release Date 2013/06 -
The Best Damn IT Security Management Book Period
Author Robert McCrie , Susan Snedaker
The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues fa....
Release Date 2011/04 -
Author William Byers
In today's unpredictable and chaotic world, we look to science to provide certainty and answers--and often blame it when things go wrong. The Blind Spot reveals why our faith in scientific certainty is a dangerous illusion, and how only by embracing science's inhe....
Release Date 2011/03 -
The Broadcast Century and Beyond, 4th Edition
Author Michael C Keith , Robert L Hilliard
The Broadcast Century and Beyond, 4th Edition, is a popular history of the most influential and innovative industry of the previous and current century. The story of broadcasting is told in a direct and informal style, blending personal insight and authoritative sch....
Release Date 2004/10 -
Author Michele Orru , Christian Frichot , Wade Alcorn
Hackers exploit browser vulnerabilities to attack deep within networksThe Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a ....
Release Date 2014/03 -
The Business Analyst as Strategist
Author Kathleen B. Hass
An organization's ability to achieve strategic goals through programs and supporting projects depends on its ability to establish a future vision, set strategic goals, select the most valuable projects, and then execute flawlessly. Organizational strategic al....
Release Date 2007/12 -
The Business Case For Network Security: Advocacy, Governance, And Roi
Author Warren Saxe , Catherine Paquet
Understand the total cost of ownership and return on investment for network security solutionsUnderstand what motivates hackers and how to classify threatsLearn how to recognize common vulnerabilities and common types of attacksExamine modern day security systems, d....
Release Date 2004/12