-
Business and Competitive Analysis: Effective Application of New and Classic Methods
Author Babette E. Bensoussan , Craig S. Fleisher
“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.” --Bill Fiora, Partner and Founder, Outward Insights “All practicing managers and bu....
Release Date 2007/02 -
A Short Overview of Social Networks and Their Uses
Author Juliette Powell
This Element is an excerpt from 33 Million People in the Room: How to Create, Influence, and Run a Successful Business with Social Networking (9780137154357) by Juliette Powell. Available in print and digital formats.Profiling the world of social networks: what you ....
Release Date 2010/05 -
Corporate Governance Matters: A Closer Look at Organizational Choices and Their Consequences
Author Brian Tayan , David Larcker
Corporate Governance Matters gives corporate board members, officers, directors, and other stakeholders the full spectrum of knowledge they need to implement and sustain superior governance. Authored by two leading experts, this comprehensive reference thoroughly ad....
Release Date 2011/04 -
The PayPal Official Insider Guide to Internet Security: Spot scams and protect your online business
Author Michelle Savage
Technology moves fast. So do criminals. Cyber attacks hit large and small merchants alike, phishers and fraudsters seem to be everywhere, and identity theft is prevalent. But this is not the end of the world, and you can’t afford to hide in the closet. Your customer....
Release Date 2012/10 -
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work
Author Anthony David Giordano
Make Information GovernanceWork: Best Practices, Step-by-Step Tasks, and Detailed DeliverablesMost enterprises recognize the crucial importance of effective information governance. However, few are satisfied with the value of their efforts to date. Information gover....
Release Date 2014/09 -
Author Lloyd Kaufman
Film is a visual medium, the work of Eric Rohmer and Kevin Smith notwithstanding. It is important for a director and cinemtographer to use their VISUAL EYES in order to VISUALIZE how to make their movie most effective. Also, there is the messy business of actors. ....
Release Date 2013/04 -
Author Neal Allen
Network Maintenance and Troubleshooting GuideField-Tested Solutions for Everyday Problems, Second EditionNeal AllenThe 100% practical, real-world guide to anticipating, finding, and solving network problems—fast!Real-life networks don’t always behave “by the book.” ....
Release Date 2009/10 -
Network Access Control For Dummies®
Author Denzil Wessels , Rich Campagna , Jay Kelley
Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, a....
Release Date 2009/05 -
Author Martin Nystrom , Chris Fry
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to mon....
Release Date 2009/02 -
The Complete Idiot's Guide to Business Law
Author Cara C. Putman
The only guide of its kind! Undergraduate college students working toward business degrees, MBA graduate students, and first year law students have one thing in common: they need to take courses in business law. Unlike cumbersome and expensive textbooks, The Comple....
Release Date 2009/05 -
Process Systems Engineering for Biofuels Development
A comprehensive overview of current developments and applications in biofuels production Process Systems Engineering for Biofuels Development brings together the latest and most cutting-edge research on the production of biofuels. As the first book specifically devoted to process syst.... -
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
Focused coverage of every topic on the current version of the CompTIA CySA+ examGet on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool. Inside, cybersecurity professional Bobby Rogers guides you on your career path, providing expert tips and sound advice .... -
Security Policies and Implementation Issues, 2nd Edition
Author Johnson
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies and Implementation Issues, Second Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational....
Release Date 2014/08 -
Author Karen Pearlman
There are many books on the technical aspects of film and video editing. Much rarer are books on how editors think and make creative decisions.Filled with timeless principles and thought-provoking examples from a variety of international films, the second edition o....
Release Date 2015/12 -
The JOBS Act: Crowdfunding for Small Businesses and Startups
Author William Michael Cunningham
On April 5, 2012, President Barack Obama signed the Jumpstart Our Business Startups Act, better known as the JOBS Act. The act is designed to "reopen American capital markets to small companies," defined in the act as Emerging Growth Companies. This is one of the mo....
Release Date 2012/09 -
Author Mohammed Moreb
Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investi....
Release Date 2022/04 -
Author Gretchen Anderson
Designers of all stripes today are seeking social and civic projects that have a mission to serve the greater good at their core. Part of this growing trend stems from the desire to use skills for their highest potential. But the real payoff is the ability to use n....
Release Date 2015/06 -
Author Becky Livingston
Web 2.0 is transforming workplace learning in many ways. This Infoline is designed to introduce you to the many Web 2.0 technologies available and give you ideas about how to implement them in your organization and will help you identify various social networking op....
Release Date 2010/01 -
Key Case Law Rules for Government Contract Formation
Author Patrick Butler
Go Beyond the FAR!The guidance contained in the almost 2000 pages of the Federal Acquisition Regulation and the various agency supplements are just a part of the resources government acquisition professionals need to do their jobs effectively. Accessing and un....
Release Date 2014/09 -
Author Tobias Klein
"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."–Felix 'FX' LindnerA Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world....
Release Date 2011/11 -
Author Zaid Hassan
Current responses to our most pressing societal challenges—from poverty to ethnic conflict to climate change—are not working. These problems are incredibly dynamic and complex, involving an ever-shifting array of factors, actors, and circumstances. They demand a hig....
Release Date 2014/02 -
Business Continuity Management Systems - Implementation and certification to ISO 22301
Author Hilary Estall
This practical guide is written for organisations who are implementing a business continuity management system and certification in line with ISO 22301. It will prove invaluable for those new to business continuity management or to management systems. Enriched with....
Release Date 2012/09 -
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Author Kevin Cardwell , Lee Allen
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environmentsAbout This BookLearn how to build your own pentesting lab environment to practice advanced techniquesCustomize your own scripts, and learn methods to exploit 32....
Release Date 2016/03 -
The Ransomware Threat Landscape
Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in p.... -
Incident Response with Threat Intelligence
Author Roberto Martínez
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligenceKey FeaturesUnderstand best practices for detecting, containing, and recovering from modern cyber threatsGet practical experience embracing incident response using intelli....
Release Date 2022/06 -
Certified Information Security Manager Exam Prep Guide
Author Hemang Doshi
Pass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey FeaturesPass the CISM exam confidently with this step-by-step guideExplore practical solutions that validate your knowledge and expertise in managing enterprise information s....
Release Date 2021/11 -
CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS)
Author Earl Carter
Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policiesReview techniques applicable to both network- and host-based platformsReview the security wheel concepts and apply security to AVVID using the SAFE BlueprintInstall and c....
Release Date 2004/02 -
Quicken 2015 The Official Guide, 3rd Edition
Author Bobbi Sandberg
The ONLY official guide to the 2015 release of the #1 bestselling personal finance software“Intuit-approved and loaded with secrets, this book provides you with recipes for financial success.” –Scott Cook, Co-Founder, Intuit, Inc.Quicken 2015: The Official Guide sho....
Release Date 2014/11 -
Implementing Digital Forensic Readiness
Author Jason Sachowski
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organizati....
Release Date 2016/02