-
Author Ryan Leirvik
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are availabl....
Release Date 2022/01 -
Understanding Government Contract Law
Author Terrance M. O'Connor
A “back-to-basics” guide to government contract lawFinally! A plain-English presentation of the basic legal concepts of government contract law for professionals at any stage in their careers.Until now, anyone in the procurement field has had to trudge through....
Release Date 2007/02 -
Author Frank Rubin
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: ....
Release Date 2022/08 -
Author Amr Sukkar
This book tries to support the elaboration and implementation of strategies and to foster SMEs and entrepreneurship development.Most of businesses fall within the category of start-up, small and medium size enterprises. Therefore, governments in part of their quest to reform the economy and related ....
Release Date 2022/08 -
Agile Model-Based Systems Engineering Cookbook
Discover recipes for addressing the growing complexity of modern systems by applying agile methodologies and techniques in model-based systems engineering (MBSE)Key FeaturesLearn how Agile and MBSE can work iteratively and collaborate to overcome system complexityDevelop essential systems engineerin.... -
Author Andrea Simmons
Understand the role of Information Security ManagersYour responsibilities as an information security manager are critical. Advising on protecting the organisation's assets, security and data systems, not to mention its reputation, are in your hands. A major securit....
Release Date 2012/08 -
Author Janos Gyerik
Primarily written for those who are new to version control systems, this easy-to-follow guide to Bazaar will quickly make you an expert. From basic principles to creating plugins – it’s all here.Gain an understanding of what version control is, and how you can benef....
Release Date 2013/06 -
Author LID Editorial
Who you know has always been as important as what you know, and social or business networks (that is, groups of people connecting together with a common interest) have existed since time began. Your connections can help with everything from business deals or career ....
Release Date 2014/06 -
Fire Your Stock Analyst! Analyzing Stocks on Your Own
Author Harry Domash
In Fire Your Stock Analyst!, San Francisco Chronicle investment columnist Harry Domash presents a start-to-finish approach to stock selection that draws on winning techniques from the world's top money managers, uses readily available information, and is easy to im....
Release Date 2002/09 -
Computer Forensics InfoSec Pro Guide
Author David Cowen
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Infor....
Release Date 2013/03 -
Being a Solo Librarian in Healthcare
Author Elizabeth C Burns
This book brings to light the current job responsibilities of the healthcare librarian, but at the same time reveals a dichotomy. In theory, advances in healthcare research promise better care and improved safety for patients. In practice, there are barriers that un....
Release Date 2015/05 -
Author Mary M. Somerville
By fostering principles of systems thinking and informed learning though an inclusive, participatory design process that advances information exchange, reflective dialogue, and knowledge creation, the Informed Systems Approach promotes conceptual change in workplace....
Release Date 2015/07 -
Author Josh Pauli
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system....
Release Date 2013/06 -
Thinking Security: Stopping Next Year’s Hackers
Author Steven M. Bellovin
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re a....
Release Date 2015/11 -
Author Joy R. Butler
If you actively use the internet to advance your business and professional endeavors, you are a cyber citizen and this book is for you. As a good cyber citizen, you want to stay legal online and protect your online interests. The Cyber Citizen’s Guide Th....
Release Date 2010/05 -
Cyber Security Policy Guidebook
Author Joseph Weiss , Jeffrey Schmidt , Marcus H. Sachs , Paul Rohmeyer , Jason Healey , Jen
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers ....
Release Date 2012/04 -
Unmanned Aerial Vehicles: Embedded Control
Author Rogelio Lozano
This book presents the basic tools required to obtain the dynamical models for aerial vehicles (in the Newtonian or Lagrangian approach). Several control laws are presented for mini-helicopters, quadrotors, mini-blimps, flapping-wing aerial vehicles, planes, etc. Fi....
Release Date 2010/03 -
Can't Not Do: The Compelling Social Drive that Changes Our World
Author Paul Shoemaker
With so many social challenges facing our world, trying to effect change feels daunting. The problems are complex, the politics murky, and the players innumerable. Yet, every day there are regular heroes making a significant impact on our most intractable social is....
Release Date 2015/08 -
Integrating Program Management and Systems Engineering
Author Eric Rebentisch
Integrate critical roles to improve overall performance in complex engineering projectsIntegrating Program Management and Systems Engineering shows how organizations can become more effective, more efficient, and more responsive, and enjoy better performance outcom....
Release Date 2017/02 -
Cyber Security and Digital Forensics
Author Mangesh M. Ghonge , Sabyasachi Pramanik , Ramchandra Mangrulkar , Dac-Nhuong Le
CYBER SECURITY AND DIGITAL FORENSICSCyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.Cur....
Release Date 2022/03 -
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
Author Stephen Hilt , Kyle Wilhoit , Aaron Shbeeb , Bryan Singer , Clint Bodungen
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed wayThis practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to ....
Release Date 2016/09 -
Trust Building and Boundary Spanning in Cross-Border Management
Author Michael Zhang
This edited book addresses two critical issues in international management: building trust and managing boundary spanning activities between international business partners. The duel-process of internationalization of multinational corporations (MNCs), through globalisati....
Release Date 2018/03 -
Under Control: Governance Across the Enterprise
Author Jacob Lamm
Under Control captures decades of business governance experience from many of the leading authorities at CA, Inc. This book sets out not only to explain the essential challenges of effective business governance, but to help you build solutions for your organization ....
Release Date 2009/12 -
Check Point NGX R65 Security Administration
Author Ralph Bonnell
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and ....
Release Date 2011/08 -
Author Melissa M. Stone , Terri D. Barreiro
This book provides a guided deep dive into the early stages of venture development of social entrepreneurship. It introduces concepts that provide important insights necessary for social venture success. It introduces a set of entrepreneurial tools designed for the ....
Release Date 2013/08 -
Author Cameron Buchanan
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali LinuxIn DetailAs attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools ar....
Release Date 2014/07 -
Author Massimo Bertaccini
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and....
Release Date 2022/03 -
Instant Penetration Testing: Setting Up a Test Lab How-to
Author Vyacheslav Fadyushin
Set up your own penetration testing lab, using practical and precise recipesLearn something new in an Instant! A short, fast, focused guide delivering immediate results.A concise and clear explanation of penetration testing, and how you can benefit from itUnderstand....
Release Date 2013/03 -
How to Use Web 2.0 and Social Networking Sites Securely
Author IT Governance Research Team
This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.
Release Date 2009/01