-
Business Continuity and the Pandemic Threat
Author Robert Clark
Considering the pandemic threat in a business continuity context I thoroughly enjoyed reading Clark’s book which is written in a style that makes it easy for anyone to understand without requiring a background in medicine or business. I have been involved in....
Release Date 2016/06 -
Particle Technology and Engineering
Author Chuan-Yu Wu , Jonathan P.K. Seville
Particle Technology and Engineering presents the basic knowledge and fundamental concepts that are needed by engineers dealing with particles and powders. The book provides a comprehensive reference and introduction to the topic, ranging from single particle charac....
Release Date 2016/05 -
Author Will Gragido , Iain Davison , David DeSanto , John Pirc
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting....
Release Date 2016/05 -
Author Stephen M.R. Covey , David A. Kaplan , Joel Peterson
Trust is the glue that holds an organization together. It turns deflection into transparency, suspicion into empowerment, and conflict into creativity. With it, a tiny company like John Deere grew into a worldwide leader. Without it, a giant corporation like Enron ....
Release Date 2016/05 -
Integrated Vehicle Dynamics and Control
Author Maofei Zhu , Linfeng Zhao , Qidong Wang , Hansong Xiao , Wuwei Chen
A comprehensive overview of integrated vehicle system dynamics exploring the fundamentals and new and emerging developmentsThis book provides a comprehensive coverage of vehicle system dynamics and control, particularly in the area of integrated vehicle dynamics co....
Release Date 2016/05 -
Author Christiane Paul
Reflecting the dynamic creativity of its subject, this definitive guide spans the evolution, aesthetics, and practice of today’s digital art, combining fresh, emerging perspectives with the nuanced insights of leading theorists. Showcases the critical and th....
Release Date 2016/05 -
The Handbook of Board Governance
Author John Fraser , Richard Leblanc
Build a more effective board with insight from the forefront of corporate governanceThe Handbook of Board Governance provides comprehensive, expert-led coverage of all aspects of corporate governance for public, nonprofit, and private boards. Written by collaborati....
Release Date 2016/05 -
Author Mehmet Sahinoglu
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of....
Release Date 2016/05 -
CISSP For Dummies, 5th Edition
Author Peter H. Gregory , Lawrence C. Miller
The fast and easy way to secure your CISSP certificationAre you a security professional seeking the valuable CISSP certification? Good for you! CISSP For Dummies is the ideal starting point on your journey, providing you with a friendly and accessible framework for....
Release Date 2016/05 -
Author Raymond Blockmon
Master CEH v9 and identify your weak spotsCEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can....
Release Date 2016/05 -
Author Sean-Philip Oriyano
The ultimate preparation guide for the unique CEH exam.The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you inte....
Release Date 2016/05 -
The Official (ISC)2 Guide to the SSCP CBK, 4th Edition
Author Steven Hernandez , Adam Gordon
The fourth edition of the Official (ISC)2® Guide to the SSCP CBK® is a comprehensive resource providing an in-depth look at the seven domains of the SSCP Common Body of Knowledge (CBK). This latest edition provides an updated, detailed guide that is considered one....
Release Date 2016/05 -
The Laws of Lifetime Growth, 2nd Edition
Author Catherine Nomura , Dan Sullivan
NEW EDITION, EXPANDED AND UPDATED Take Charge of Your Future!Growth is a fundamental human need—it is at the root of everything that gives us a feeling of accomplishment, satisfaction, meaning, and progress. In this inspiring book, Dan Sullivan and Catherine N....
Release Date 2016/05 -
Author Nir Eyal , SC Moatti
Mobile has now become such an integral part of how we live that, for many people, losing a cell phone is like losing a limb. Everybody knows mobile is the future, and every business wants in, but what are the elements of mobile success? SC Moatti, a Silicon Va....
Release Date 2016/05 -
Author Donald D. Dunn
Executive leaders need a framework with which to evaluate current and to create new corporate ethical management systems in their organizations. This book offers such a framework, called the Moldable Model©, a system of consistent components that give leaders ....
Release Date 2016/05 -
Practical Mobile Forensics - Second Edition
Author Satish Bommisetty , Rohit Tamma , Heather Mahalik
A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platformsAbout This BookGet to grips with the basics of mobile forensics and the various forensic approachesRetrieve and analyze the data stored on mobile devices and on the ....
Release Date 2016/05 -
Author Nick Orchiston , Steve Watkins
ISO 9001:2015 – A Pocket Guide is a handy reference book that provides an overview of the ISO 9001 quality management standard. This is the perfect introduction to the Standard, and will help ensure the quality of your products and services, increase customer....
Release Date 2016/05 -
Nine Steps to Success: An ISO27001:2013 implementation overview
Author Alan Calder
In Nine Steps to Success – An ISO 27001 Implementation Overview, Alan provides a comprehensive overview of how to lead a successful ISO 27001-compliant ISMS implementation in just nine steps. Show and hide more
Release Date 2016/05 -
Author Ulrich Hertrampf , Gerhard Rosenberger , Manfred Kufleitner , Volker Diekert
The idea behind this book is to provide the mathematical foundations for assessing modern developments in the Information Age. It deepens and complements the basic concepts, but it also considers instructive and more advanced topics. The treatise starts with a gene....
Release Date 2016/05 -
CTS-D Certified Technology Specialist-Design Exam Guide
Author InfoComm International , Brad Grimes
Exclusively from McGraw-Hill Professional and InfoComm International, this exam guide covers the latest Certified Technology Specialist Design exam for AV professionals.CTS-D Certified Technology Specialist Design Exam Guide is a complete study system for the leadi....
Release Date 2016/04 -
Information Security Governance Simplified
Author Todd Fitzgerald
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how....
Release Date 2016/04 -
Official (ISC)2 Guide to the CAP CBK, 2nd Edition
Author Patrick D. Howard
Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization....
Release Date 2016/04 -
Author Dave Howard
When implemented correctly, release management can help ensure that quality is integrated throughout the development, implementation, and delivery of services, applications, and infrastructure. This holistic, total cost of ownership approach allows for higher levels....
Release Date 2016/04 -
Introduction to Computer Networks and Cybersecurity
Author Chwan-Hwa Wu
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern net....
Release Date 2016/04 -
Author Dahai Liu
For the past several decades, systems engineering has grown rapidly in its scope and application and shown significant benefits for the design of large, complex systems. However, current systems engineering textbooks are either too technical or at a high conceptual....
Release Date 2016/04 -
Digital Video Editing Fundamentals
Author Wallace Jackson
This compact visual guide covers concepts central to digital video using the affordable Corel Video Studio Ultimate X9 software package as well as open source digital video editing package Editshare Lightworks 12.Digital Video Editing Fundamentals builds on the ess....
Release Date 2016/04 -
Air and Missile Defense Systems Engineering
Author John B. Hoffman , Warren J. Boord
Air and Missile Defense Systems Engineering fills a need for those seeking insight into the design procedures of the air and missile defense system engineering process. Specifically aimed at policy planners, engineers, researchers, and consultants, it presents a ba....
Release Date 2016/04 -
CISA: Certified Information Systems Auditor Study Guide, 4th Edition
Author Allen Keele , David L. Cannon
The ultimate CISA prep guide, with practice examsSybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with th....
Release Date 2016/03 -
Author Chris Minnick , Eva Holland
Learn to code the fun way with nine real projects for true beginnersAdventures in Coding is written specifically for young people who want to learn how to code, but don't know where to begin. No experience? No problem! This book starts from the very beginning to t....
Release Date 2016/03