-
A Short Overview of Social Networks and Their Uses
Author Juliette Powell
This Element is an excerpt from 33 Million People in the Room: How to Create, Influence, and Run a Successful Business with Social Networking (9780137154357) by Juliette Powell. Available in print and digital formats.Profiling the world of social networks: what you ....
Release Date 2010/05 -
Author M. K. Jabbi , Muchkund Dubey
At the tenth SAARC Summit, it was agreed that an inter-governmental social charter for South Asia under the aegis of SAARC would be prepared. In India, the Council for Social Development formulated the citizens' social charter. The development of the social char....
Release Date 2009/12 -
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
Author Madjid Nakhjiri , Mahsa Nakhjiri
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.AAA and Network Security for Mobile Access is an invalua....
Release Date 2005/10 -
AAA Identity Management Security
Author Brandon J. Carroll , - CCIE #23837 , Premdeep Banga , - CCIE #21713 , Vivek Santuka
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACSAAA solutions are very frequently used by customers to provide secure access to devices and networksAAA solutions are difficult and confusing ....
Release Date 2010/12 -
Access Control and Identity Management, 3rd Edition
Author Mike Chapple
Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact acc....
Release Date 2020/10 -
Access Control, Authentication, and Public Key Infrastructure
Author Tricia Ballad , Bill Ballad , Erin Banks
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and pr....
Release Date 2010/10 -
Author Katie Cunningham
Get practical guidelines for making your website accessible to people with disabilities. With this handbook, you’ll learn how to design or develop a site that conforms to Section 508 of the US Rehabilitation Act—and in the process you’ll discover how to provide a be....
Release Date 2012/09 -
Accountability: Angst, Awareness, Action
Author Jay P. Desai
This book was written to increase the public understanding of 'accountability'. The author constructs a three-dimensional lens with which he examines the mechanisms that hold our governance institutions accountable. Desai explains why a burst of governance reforms....
Release Date 2012/02 -
Author Tan
This book covers all the fundamental concepts of Health Management Information Systems (HMIS), provides relevant and current HMIS cases throughout, and touches on emerging technologies. Topics include: information systems from a managerial perspective; roles of cio....
Release Date 2010/03 -
Author Ben Forta
Written by the best known and most trusted name in the ColdFusion community, Ben Forta, The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time. Volume 3: Advanced Application Development, focuses on application security, sc....
Release Date 2010/08 -
Adobe ColdFusion 8 Web Application Construction Kit, Volume 1: Getting Started
Author Charlie Arehart , Raymond Camden , Ben Forta
The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time—the books that most ColdFusion developers used to learn the product. This Getting Started volume starts with Web and Internet fundamentals and database concepts and des....
Release Date 2007/09 -
Adobe® ColdFusion® 9 Web Application Construction Kit, Volume 1: Getting Started
Author Charlie Arehart , Raymond Camden , Ben Forta
Written by the best known and most trusted name in the ColdFusion community, Ben Forta, The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time - the books that most ColdFusion developers used to learn the product. This Gett....
Release Date 2010/04 -
Adobe® ColdFusion® Web Application Construction Kit: ColdFusion® 10 Enhancements and Improvements
Author Ben Forta
Adobe ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time—used by more ColdFusion developers to learn the product than any other books. ColdFusion 10 was built to make your applications safer, more scalable, and more powerf....
Release Date 2013/04 -
Advanced API Security: OAuth 2.0 and Beyond
Author Prabath Siriwardena
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is conv....
Release Date 2019/12 -
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
Author Prabath Siriwardena
AdvancedAPI Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs.API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business func....
Release Date 2014/08 -
Advanced BlackBerry 6 Development
Author Chris King
BlackBerry devices and applications are selling by the millions. As a BlackBerry developer, you need an advanced skill set to successfully exploit the most compelling features of the platform. This book will help you develop that skill set and teach you how to creat....
Release Date 2011/01 -
Advanced CISSP Prep Guide: Exam Q&A
Author Russell Dean Vines , Ronald L. Krutz
Get ready to pass the CISSP exam and earn your certification with this advanced test guideUsed alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the hel....
Release Date 2002/10 -
Advanced Electric Drives: Analysis, Control, and Modeling Using MATLAB/Simulink
Author Ned Mohan
With nearly two-thirds of global electricity consumed by electric motors, it should come as no surprise that their proper control represents appreciable energy savings. The efficient use of electric drives also has far-reaching applications in such areas as factory ....
Release Date 2014/08 -
Advanced Infrastructure Penetration Testing
Author Chiheb Chebbi
A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructureAbout This BookAdvanced exploitation techniques to breach modern operating systems and complex network....
Release Date 2018/02 -
Author Christopher Elisan
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting....
Release Date 2015/09 -
Advanced Modern Control System Theory and Design
Author Stanley M. Shinners
The definitive guide toadvanced control system designAdvanced Modern Control System Theory and Design offers the most comprehensive treatment of advanced control systems available today. Superbly organized and easy to use, this book is designed for an advanced cours....
Release Date 1998/09 -
Author Wil Allsopp
Build a better defense against motivated, organized, professional attacksAdvanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not....
Release Date 2017/03 -
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Author Kevin Cardwell , Lee Allen
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environmentsAbout This BookLearn how to build your own pentesting lab environment to practice advanced techniquesCustomize your own scripts, and learn methods to exploit 32....
Release Date 2016/03 -
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Author Lee Allen
Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook.Learn how to perform an efficient, organized, and effective penetration test from start to finishGain hands-on penetration t....
Release Date 2012/05 -
Author Araceli Treu Gomes , Ira Winkler
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book....
Release Date 2016/11 -
Author Eric Cole
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with b....
Release Date 2012/12 -
Advanced Persistent Threat Hacking
Author Tyler Wrightson
Master the tactics and tools of the advanced persistent threat hackerIn this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses th....
Release Date 2014/12 -
Advanced Photovoltaic Installations
Author Balfour
Part of the Art and Science of Photovoltaics series The use of high-level, high-performing solar panel systems is quickly becoming a mainstream energy source. Advanced Photovoltaic Installations goes beyond the basics and provides readers with the knowledge they ne....
Release Date 2011/12 -
Advances in Communications-Based Train Control Systems
Author F. Richard Yu
With rapid population explosion, improving rail transit speed and capacity is strongly desirable around the world. Communication-based train control (CBTC) is an automated train control system using high capacity bidirectional train-ground communications to ensure ....
Release Date 2015/11 -
Advances in High-Performance Motion Control of Mechatronic Systems
Author Chee Khiang Pang , Mitsuo Hirata , Takashi Yamaguchi
Mechatronic systems are used in a range of consumer products from large-scale braking systems in vehicular agents to small-scale integrated sensors in mobile phones. To keep pace in the competitive consumer electronics industry, companies need to continuously improv....
Release Date 2017/12