-
Author Babak Akhgar , Colin Pattinson , Mohammad Dastbaz
We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates t....
Release Date 2015/03 -
Social Security For Dummies, 2nd Edition
Author Jonathan Peterson
Praise for Social Security For Dummies:"Social Security for Dummies is a must read for people of any age who want a comfortable retirement. Jonathan Peterson does a great job of explaining this complicated system and helps you understand how to get the most from the....
Release Date 2015/03 -
Kali Linux Wireless Penetration Testing : Beginner's Guide
Author Vivek Ramachandran , Cameron Buchanan
Master wireless testing techniques to survey and attack wireless networks with Kali LinuxIn DetailAs wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The K....
Release Date 2015/03 -
How to Do Everything: Genealogy, Fourth Edition
Author George G. Morgan
Discover your genealogy using the latest methods Thoroughly revised to cover new tools, techniques, and data, How to Do Everything: Genealogy, Fourth Edition uniquely addresses all the major genealogical record types and explains traditional and digi....
Release Date 2015/02 -
Application of Big Data for National Security
Author Babak Akhgar , Gregory B. Saathoff , Hamid R. Arabnia , Richard Hill , Andrew Stanif
Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combin....
Release Date 2015/02 -
Event-Based Neuromorphic Systems
Author Rodney Douglas , Adrian Whatley , Giacomo Indiveri , Tobi Delbruck , Shih-Chii Liu
Neuromorphic electronic engineering takes its inspiration from the functioning of nervous systems to build more power efficient electronic sensors and processors. Event-based neuromorphic systems are inspired by the brain's efficient data-driven communication desig....
Release Date 2015/02 -
Author Nikhil Abraham
Hands-on exercises help you learn to code like a proNo coding experience is required for Coding For Dummies, your one-stop guide to building a foundation of knowledge in writing computer code for web, application, and software development. It doesn't matter if you....
Release Date 2015/02 -
The Mobile Application Hacker's Handbook
Author Dominic Chell , Tyrone Erasmus , Shaun Colley , Ollie Whitehouse
See your app through a hacker's eyes to find the real sources of vulnerabilityThe Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this boo....
Release Date 2015/02 -
Global Dimensions of Public Administration and Governance: A Comparative Voyage
Author Jos Raadschelders , Eran Vigoda-Gadot
A comparative, interdisciplinary examination of the mechanisms behind public administrationGlobal Dimensions of Public Administration and Governance is a comprehensive, comparative text on the structure and function of governments around the world. Written by two of....
Release Date 2015/02 -
Elementary Information Security, 2nd Edition
Author Smith
An ideal text for introductory information security courses, the second edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cyber security and technology. Thoroughly updated with recently re....
Release Date 2015/02 -
Once More Unto the Breach: Managing information security in an uncertain world
Author Andrea C Simmons
The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is t....
Release Date 2015/02 -
Data Protection and the Cloud: Are the risks too great?
Author Paul Ticher
Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA’s eight principles could lead to ....
Release Date 2015/02 -
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition
Author Stephen Sims , Ryan Linn , Branko Spasojevic , Jonathan Ness , Chris Eagle , Allen Ha
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's....
Release Date 2015/01 -
Author Khosro S. Jahdi , Tom Cockburn
Evolving stories of governance and change are being written into the emerging custom and practice of all kinds of organizations today, whether they are global or domestic, startup or blue chip, corporate or government agency. Changing ways of ‘doing business’ are no....
Release Date 2015/01 -
Mastering Wireless Penetration Testing for Highly Secured Environments
Author Aaron Johns
Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionalsIn DetailPenetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By ....
Release Date 2015/01 -
Managing Information Security: Studies from real life
Author Michael Krausz
A comprehensive guide to managing an information security incident Even when organisations take precautions, they may still be at risk of a data breach. Information security incidents do not just affect small businesses: major companies and government departments ....
Release Date 2015/01 -
Advanced Persistent Threat Hacking
Author Tyler Wrightson
Master the tactics and tools of the advanced persistent threat hackerIn this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses th....
Release Date 2014/12 -
CompTIA Security+ All-in-One Exam Guide (Exam SY0-401), 4th Edition
Author Greg White , Wm. Arthur Conklin , Chuck Cothren , Roger Davis , Dwayne Williams
Get complete coverage of all objectives included on the latest release of the CompTIA Security+ exam from this comprehensive resource. Cowritten by leading information security experts, this authoritative guide fully addresses the skills required for securing a netw....
Release Date 2014/12 -
Industrial Network Security, 2nd Edition
Author Joel Thomas Langill , Eric D. Knapp
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you wi....
Release Date 2014/12 -
Tissue Engineering, 2nd Edition
Author Jan De Boer , Clemens Van Blitterswijk
Tissue Engineering is a comprehensive introduction to the engineering and biological aspects of this critical subject. With contributions from internationally renowned authors, it provides a broad perspective on tissue engineering for students coming to the subject ....
Release Date 2014/12 -
The Basics of Digital Forensics, 2nd Edition
Author John Sammons
The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to per....
Release Date 2014/12 -
Author Justin Rainey , Timothy Virtue
The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC². The new HCISPP certification, focused on health care information security and privacy, is similar ....
Release Date 2014/12 -
Building an Intelligence-Led Security Program
Author Allan Liska
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are....
Release Date 2014/12 -
Introduction to US Cybersecurity Careers
Author Henry Dalziel
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecuri....
Release Date 2014/12 -
How to Defeat Advanced Malware
Author Simon Cros , Henry Dalziel
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverage....
Release Date 2014/12 -
A Practical Guide to Computer Forensics Investigations
Author Darren R. Hayes
All you need to know to succeed in digital forensics: technicalandinvestigative skills, in one bookComplete, practical, and up-to-dateThoroughly covers digital forensics for Windows, Mac, mobile, hardware, and networksAddresses online and lab investigations, documen....
Release Date 2014/12 -
Scenario-Focused Engineering: A toolbox for innovation and customer-centricity
Author Drew Fletcher , Austina De Bonte
Blend the art of innovation with the rigor of engineeringGreat technology alone is rarely sufficient to ensure a product’s success. Scenario-Focused Engineering is a customer-centric, iterative approach used to design and deliver the seamless experiences and emotion....
Release Date 2014/12 -
Engineering Systems Acquisition and Support
Author A Sinha , J Mo
Engineering systems such as an aircraft or frigate are highly complex and specifically designed to meet the customer’s requirements. This important book provides the information necessary to acquire and support complex engineering systems expected to last for ....
Release Date 2014/12 -
Disaster Response and Recovery: Strategies and Tactics for Resilience, 2nd Edition
Author David A. McEntire
Provides an overview of the various types of disasters that may occur, the myriad of actors that are involved in emergency management, and the diverse theoretical frameworks from which post-disaster activities may be approached.Includes updated chapters keeping the ....
Release Date 2014/12