-
Author Ric Messier
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book cov....
Release Date 2018/07 -
Practical Mobile Forensics - Third Edition
Author Heather Mahalik , Satish Bommisetty , Oleg Skulkin , Rohit Tamma
Investigate, analyze, and report iOS, Android, and Windows devicesAbout This BookGet hands-on experience in performing simple to complex mobile forensics techniques.Retrieve and analyze data stored not only on mobile devices but also through the cloud and other conn....
Release Date 2018/01 -
Computer Forensics JumpStart, Second Edition
Author Diane Barrett , Neil Broom , Ed Tittel , K Rudolph , Michael G. Solomon
Essential reading for launching a career in computer forensicsInternet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer....
Release Date 2011/03 -
Author Bryan E. Harkins , David A. Westcott , David D. Coleman
The most detailed, comprehensive coverage of CWSP-205 exam objectivesCWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objecti....
Release Date 2016/09 -
CISSP Official (ISC)2 Practice Tests
Author David Seidl , Mike Chapple
Full-length practice tests covering all CISSP domains for the ultimate in exam prepThe CISSP Official (ISC)2 Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per dom....
Release Date 2016/07 -
Modern Control System Theory and Design, 2nd Edition
Author Stanley M. Shinners
The definitive guide to control system designModern Control System Theory and Design, Second Edition offers the most comprehensive treatment of control systems available today. Its unique text/software combination integrates classical and modern control system theor....
Release Date 1998/05 -
CISSP Exam Cram, Second Edition
Author Michael Gregg
Updated for 2009Covers the critical information you’ll need to know to score higher on your CISSP exam!Build and manage an effective, integrated security architectureSystematically protect your physical facilities and the IT resources they containImplement and admin....
Release Date 2009/03 -
CompTIA Security+ Certification Study Guide: Network Security Essentials
Author Ahmed F. Sheikh
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and yo....
Release Date 2020/09 -
Scene of the Cybercrime, 2nd Edition
Author Michael Cross , Debra Littlejohn Shinder
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the firs....
Release Date 2008/07 -
Mastering Metasploit - Fourth Edition
Author Nipun Jaswal
Discover the next level of network defense and penetration testing with the Metasploit 5.0 frameworkKey FeaturesMake your network robust and resilient with this updated edition covering the latest pentesting techniques Explore a variety of entry points to compromise a sy....
Release Date 2020/06 -
Mobile Location Services: The Definitive Guide
Author Andrew Jagoe
The first comprehensive guide to building and deploying mobile location-based servicesDetailed coverage of mobile location servers, client platforms, protocols, and standardsMapping, geocoding, mobile positioning, security, personalization, privacy, and moreForeword....
Release Date 2002/12 -
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002, Second Edition
Author Michael Gregg
CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 examCASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition of the bestselling book covering the CASP certificat....
Release Date 2014/10 -
Author Nikhil Abraham
Hands-on exercises help you learn to code like a proNo coding experience is required for Coding For Dummies, your one-stop guide to building a foundation of knowledge in writing computer code for web, application, and software development. It doesn't matter if you....
Release Date 2015/02 -
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition
CISSP Study Guide - fully updated for the 2021 CISSP Body of Knowledge (ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exa.... -
Systems Leadership, 2nd Edition
Author Karl Stewart , Catherine Burke , Ian Macdonald
The new edition of this influential and bestselling book is concerned with how people come together to achieve a productive purpose. Survival and success in business and social terms have always depended upon our ability to form and sustain social organisations. Pe....
Release Date 2018/05 -
Windows Virus and Malware Troubleshooting
Author Mike Halsey , Andrew Bettany
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.Whatever version of Windows you're using, the threat of virus and malware infection is always a com....
Release Date 2017/03 -
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Author Sanjib Sinha
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux....
Release Date 2018/11 -
The Enterprise Path to Service Mesh Architectures, 2nd Edition
Author Lee Calcote
Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This....
Release Date 2020/11 -
31 Days Before Your CCNA Exam: A Day-by-Day Review Guide for the CCNA 640-802 Exam, Second Edition
Author Allan Johnson
31 Days Before your CCNA Exam, Second Edition, offers you a personable and practical way to understand the certification process, commit to taking the exam, and finish your preparation using a variety of Foundational and Supplemental study resources.The book breaks ....
Release Date 2008/11 -
A Profile of the United States Toy Industry, Second Edition
Author Christopher Byrne
The toy industry is one of the most consistently misunderstood sectors of American business, comprising a wide range of businesses under one banner-entertainment, commodities, fashion and licensing-that each behave differently. Broad-based change is constant, with ....
Release Date 2017/01 -
Author Nipun Jaswal
Gain basic skills in network forensics and learn how to apply them effectively Key FeaturesInvestigate network threats with ease Practice forensics tasks such as intrusion detection, network analysis, and scanning Learn forensics investigation at the network levelB....
Release Date 2019/03 -
Successful Cybersecurity Professionals
Author Dr. Steven Brown
This book provides a unique perspective into the mindset of psychology and cybersecurity.It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals’ behavior, but our b....
Release Date 2020/09 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
Principles of Data Management - Facilitating information sharing Second edition
Author Keith Gordon
Data is a valuable corporate asset and its effective management can be vital to an organisation's success. This professional guide covers all the key areas of data management, including database development and corporate data modelling. It is business-focused, prov....
Release Date 2013/11 -
Risk Management and ISO 31000 - A pocket guide
Author Alan Field
This pocket guide introduces the premise of RBT (risk-based thinking), exploring the principles outlined in the risk management standard, ISO 31000:2018. Understand the benefits of risk-based thinking and ISO 31000 with this pocket guide!
Release Date 2023/03 -
Demystifying Cryptography with OpenSSL 3.0
Author Alexei Khlebnikov , Jarle Adolfsen
Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, digital signatures, SSL/TLS connectivity, and PKI handlingKey FeaturesSecure your applications against common network security threats using OpenSSLGet to grips with the ....
Release Date 2022/10 -
Computers and Information Processing for Business
Author Sergio S. Ribeiro
This book is an introduction to computers covering relevant topics that include: computers and society, the Internet, social media, Microsoft Office 2019, and high-level programming.The main goals are to help students to define computers and information processing and des....
Release Date 2020/10 -
Introduction to Cryptography with Coding Theory, 3rd Edition
Author Lawrence C. Washington , Wade Trappe
None Show and hide more
Release Date -0001/11