-
Auditing IT Infrastructures for Compliance, 2nd Edition
Author Weiss
The Second Edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a....
Release Date 2015/07 -
Take Control of TextExpander, 2nd Edition
Author Michael E Cohen
Type 120 words per minute and have fun doing it with TextExpander!Join Mac expert Michael E. Cohen as he helps you enjoy the power of TextExpander 5, the award-winning text expansion utility from Smile.With Michael's guidance, you'll learn how to create "snippets"....
Release Date 2015/07 -
ISO 50001 Energy Management Systems
Author Johannes Kals
Managers and academia targeting energy performance improvements have a valuable tool in ISO 50001 Energy Management Systems, which allows for a certification after third-party audits. Business managers may reduce costs and fully tap the strategic potential ....
Release Date 2015/07 -
Kali Linux Wireless Penetration Testing Essentials
Author Marco Alamanni
Plan and execute penetration tests on wireless networks with the Kali Linux distributionIn DetailKali Linux is the most popular distribution dedicated to penetration testing that includes a set of free, open source tools.This book introduces you to wireless penetrat....
Release Date 2015/07 -
Variance-Constrained Multi-Objective Stochastic Control and Filtering
Author Yuming Bo , Zidong Wang , Lifeng Ma
Unifies existing and emerging concepts concerning multi-objective control and stochastic control with engineering-oriented phenomenaEstablishes a unified theoretical framework for control and filtering problems for a class of discrete-time nonlinear stochastic syst....
Release Date 2015/06 -
Freedom to Change: Four Strategies to Put Your Inner Drive into Overdrive
Author Michael Fullan
Break free to make real change for yourself and othersHave you ever felt like your progress was being blocked, not just by your own circumstances, but by the presence and actions of others? Freedom to Change releases you from the trap of constantly telling yourself....
Release Date 2015/06 -
Sage 50 Accounts For Dummies, 3rd UK Edition
Author Jane E. Kelly
The easy way to come to grips with Sage 50 AccountsWritten by a Sage 50 Accounts expert and packed with step-by-step instructions, this hands-on, accessible guide is the easiest way to master this popular small business accounting software. Walking you through every....
Release Date 2015/06 -
Author Suraj Gaurav , Suren Machiraju
Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform.This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NE....
Release Date 2015/06 -
Author Gretchen Anderson
Designers of all stripes today are seeking social and civic projects that have a mission to serve the greater good at their core. Part of this growing trend stems from the desire to use skills for their highest potential. But the real payoff is the ability to use n....
Release Date 2015/06 -
DIY Comms and Control for Amateur Space
Author Sandy Antunes
Radio spectrum for commanding and recording from our satellites is a shared resource with subtle hurdles. We walk the path originally paved by AMSATs to discuss the steps and licensing needed to set up and operate both a command uplink and a data download station an....
Release Date 2015/06 -
Python Web Penetration Testing Cookbook
Author Dave Mound , Benjamin May , Andrew Mabbitt , Terry Ip , Cameron Buchanan
Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testingIn DetailThis book gives you an arsenal of Python scripts perfect to use or to customize your needs for each stage of the testing process. Each chapter t....
Release Date 2015/06 -
A Course in Mathematical Cryptography
Author Gerhard Rosenberger , Martin Kreuzer , Benjamin Fine , Gilbert Baumslag
Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew ....
Release Date 2015/06 -
Being a Solo Librarian in Healthcare
Author Elizabeth C Burns
This book brings to light the current job responsibilities of the healthcare librarian, but at the same time reveals a dichotomy. In theory, advances in healthcare research promise better care and improved safety for patients. In practice, there are barriers that un....
Release Date 2015/05 -
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis
Author Marco M. Morana , Tony UcedaVelez
This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security counte....
Release Date 2015/05 -
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Author Abdul Aslam , Chris K. Williams , Stanley G. Siegel , Scott E. Donaldson
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an e....
Release Date 2015/05 -
Author Jeff Bollinger , Brandon Enright , Matthew Valites
This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy,....
Release Date 2015/05 -
Law Librarianship in Academic Libraries
Author Yemisi Dina
In the last two decades, advancement in technology has transformed every aspect of librarianship. Law Librarianship in Academic Law Libraries discusses issues and model practices in academic law libraries. This text will help librarians and library school students u....
Release Date 2015/04 -
Author Lance Kaplan , Tarek Abdelzaher , Dong Wang
Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field ....
Release Date 2015/04 -
CompTIA Advanced Security Practitioner (CASP) CAS-002 Cert Guide
Author Troy McMillan , Robin Abernathy
Trust the best selling Authorized Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for exam success. These guides are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared....
Release Date 2015/04 -
Enterprise Mobility Suite Managing BYOD and Company-Owned Devices
Author Yuri Diogenes , Jeff Gilbert
Manage all the mobile devices your workforce relies on Learn how to use Microsoft’s breakthrough Enterprise Mobility Suite to help securely manage all your BYOD and company-owned mobile devices: Windows, iOS, and Android. Two of the leading mobile device management ....
Release Date 2015/04 -
Chinese Cybersecurity and Cyberdefense
Author Daniel Ventre
Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The....
Release Date 2015/04 -
Social Evolution and Inclusive Fitness Theory
Author James A.R. Marshall
Social behavior has long puzzled evolutionary biologists, since the classical theory of natural selection maintains that individuals should not sacrifice their own fitness to affect that of others. Social Evolution and Inclusive Fitness Theory argues that a theory ....
Release Date 2015/04 -
Author Jan Yager , Fred Yager
Along with Medicare, Social Security is one of the "rites of passage" as older Americans retire. After contributing funds to this program their entire working life, people are anxious to start getting their monthly checks. Following a brief look at why Social Secur....
Release Date 2015/04 -
Author Rohit Tamma , Donnie Tindall
A hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifactsIn DetailMany forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of t....
Release Date 2015/04 -
An Introduction to Anti-Bribery Management Systems (BS 10500): Doing right things
Author Alan Field
When is a gift not a gift? When it’s a bribe. For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? Bribes, incentives, and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, cor....
Release Date 2015/04 -
Author S. Salivahanan
Control Systems Engineering caters to the requirements of an interdisciplinary course on Control Systems at the under- graduate level. Featuring a balanced coverage of time response and frequency response analyses, the book provides an in-depth review of key topics....
Release Date 2015/04 -
CTS-I Certified Technology Specialist-Installation Exam Guide
Author InfoComm International
The Most Complete CTS-I Exam Study SystemPublished with InfoComm International, CTS-I Certified Technology Specialist-Installation Exam Guide provides comprehensive coverage of all exam objectives on the leading internationally recognized certification for audiovisu....
Release Date 2015/03 -
CISSP Practice Exams, Third Edition, 3rd Edition
Author Shon Harris
Don’t Let the Real Test Be Your First Test!Fully updated throughout and featuring new question types, this self-study tool contains more than 1250 realistic practice exam questions covering all 10 CISSP exam domains developed by the International Information Systems....
Release Date 2015/03 -
Author Bruce Wimmer , CPP
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and....
Release Date 2015/03 -
Author Dan Twing , Rick Sturm , Dennis Drogseth
CMDB Systems: Making Change Work in the Age of Cloud and Agile shows you how an integrated database across all areas of an organization’s information system can help make organizations more efficient reduce challenges during change management and reduce total cost o....
Release Date 2015/03