-
Author Jeromy Hopgood
Used from Broadway to Britain’s West End, QLab software is the tool of choice for many of the world’s most prominent sound, projection, and integrated media designers. QLab 3 Show Control: Projects for Live Performances & Installations is a project-based book on....
Release Date 2013/11 -
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Author Thomas J. Mowbray
A must-have, hands-on guide for working in the cybersecurity professionCybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as sy....
Release Date 2013/11 -
Passwords & Internet Addresses Journal For Dummies
Author Ryan C. Williams
Keep track of your passwords and learn how to make them betterYou have dozens of passwords for dozens of uses, and it seems every account has different password requirements. How can you keep them all straight while keeping them secure? This ingenious little book so....
Release Date 2013/11 -
Principles of Data Management - Facilitating information sharing Second edition
Author Keith Gordon
Data is a valuable corporate asset and its effective management can be vital to an organisation's success. This professional guide covers all the key areas of data management, including database development and corporate data modelling. It is business-focused, prov....
Release Date 2013/11 -
Author Viranch Mehta
For the most complex and dispersed networks, Icinga is the monitoring tool that puts you in control. This book gives you a thorough grounding and improves your capability in using Icinga to extract precisely the reports you need.Installation instructions with detail....
Release Date 2013/11 -
OAuth 2.0 Identity and Access Management Patterns
Author Martin Spasovski
Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.Build web, client-side, desktop,....
Release Date 2013/11 -
Pearl Harbor Revisited: United States Navy Communications Intelligence, 1924-1941
Author Frederick D. Parker
The history of various aspects of the development of the U.S. Navy's communications intelligence structure and processes in the years leading up to the attack on Pearl Harbor. The history of various aspects of the deve....
Release Date 2013/10 -
Author Steve Winterfeld , Jason Andress
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information....
Release Date 2013/10 -
Network Defense and Countermeasures: Principles and Practices, Second Edition
Author William Easttom II
Network Defense and Countermeasures:Principles and PracticesEverything you need to know about modern network attacks and defense, in one bookClearly explains core network security concepts, challenges, technologies, and skills Thoroughly updated for the latest attac....
Release Date 2013/10 -
VCP-Cloud Official Cert Guide (with DVD): VMware Certified Professional - Cloud
Author Tom Ralph , Nathan Raper
The Publisher regrets that the CD/DVD content for this title cannot be made available Online.VCP-Cloud Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" qui....
Release Date 2013/10 -
The Road to Recovery: How and Why Economic Policy Must Change
Author Andrew Smithers
Renowned economist Andrew Smithers offers prescriptive advice and economic theory on avoiding the next financial crisisIn The Road to Recovery, Andrew Smithers—one of a handful of respected economists to have accurately predicted the most recent global financial cri....
Release Date 2013/10 -
Feedback Control for Computer Systems
Author Philipp K. Janert
How can you take advantage of feedback control for enterprise programming? With this book, author Philipp K. Janert demonstrates how the same principles that govern cruise control in your car also apply to data center management and other enterprise systems. Through....
Release Date 2013/10 -
Mining the Social Web, 2nd Edition
Author Matthew A. Russell
How can you tap into the wealth of social web data to discover who’s making connections with whom, what they’re talking about, and where they’re located? With this expanded and thoroughly revised edition, you’ll learn how to acquire, analyze, and summarize data from....
Release Date 2013/10 -
What Every Engineer Should Know About Cyber Security and Digital Forensics
Author Joanna F. DeFranco
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology. Designed for the non-security professional, W....
Release Date 2013/10 -
Unified Communications Forensics
Author Joseph II Shaw , Nicholas Mr. Grant
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by l....
Release Date 2013/10 -
Metasploit Penetration Testing Cookbook - Second Edition
Author Abhinav Singh , Monika Agarwal
Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it’s ideal for Metaspoilt veterans and newcomers alike.Special focus on the latest operating ....
Release Date 2013/10 -
Author Iqbal Muhardianto , Digit Oktavianto
Analyze malware using Cuckoo Sandbox Learn how to analyze malware in a straightforward way with minimum technical skillsUnderstand the risk of the rise of document-based malwareEnhance your malware analysis concepts through illustrations, tips and tricks, step-by-s....
Release Date 2013/10 -
ISO27001/ISO27002 A Pocket Guide, 2nd edition
Author Alan Calder
Information is one of your organisation’s most important resources and keeping that information secure is vital to your business. An information security management system (ISMS) based on ISO27001/ISO27002 offers a host of benefits: Improved efficiency by hav....
Release Date 2013/10 -
Author Jean Claude Larreche
One of the most frequent challenges that managers and executives face today is: ‘How do I keep on growing and at the same time, make a profit?’ Based on the author’s extensive research on over 350 Fortune 1000 Firms, The Momentum Effect proves that the old method of....
Release Date 2013/09 -
Governance of IT - An executive guide to ISO/IEC 38500
Author A. L. Holt
Directors and government ministers across the world are increasingly being held accountable for failed IT systems, data loss and poor decisions about their organisation’s data. This valuable book is designed to bridge the gap between the governing body and CIOs/ IT ....
Release Date 2013/09 -
Web Penetration Testing with Kali Linux
Author Aamir Lakhani , Joseph Muniz
Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit.Learn key reconnaissance concepts needed as a penetrati....
Release Date 2013/09 -
Oracle SOA Governance 11g Implementation
Author Andrew Bell , Luis Augusto Weir
Being able to implement SOA governance competently can make a huge difference to your organization’s efficiency. This guide shows you how through a complete practical course based on Oracle’s highly regarded software suite.Understand SOA governance including its key....
Release Date 2013/09 -
Author Thomas Chamberlain
Make realistic and insightful network simulations with OMNeTpp Create a virtual Network Simulation Environment rapidlyFocus less on the theory and more on results, with clear, step-by-step instructions, previews, and examples to help you along the wayLearn how to ru....
Release Date 2013/09 -
Extending Your Business to Mobile Devices with IBM Worklight
Author Susan Hanson , Leonardo Olivera , Kearan McPherson , Christian Kirsch , Hossam Kator
The mobile industry is evolving rapidly. An increasing number of mobile devices, such as smartphones and tablets, are sold every year and more people are accessing services from a mobile device than ever before. For an enterprise, this can mean that a growing number....
Release Date 2013/08 -
Cyber Security and IT Infrastructure Protection
Author John R. Vacca
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It ....
Release Date 2013/08 -
Managing Information Security, 2nd Edition
Author John R. Vacca
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,....
Release Date 2013/08 -
Network and System Security, 2nd Edition
Author John R. Vacca
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate....
Release Date 2013/08 -
Digital Archaeology: The Art and Science of Digital Forensics
Author Michael W. Graves
The Definitive, Up-to-Date Guide to Digital ForensicsThe rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. In Digital Archaeology, expert practitioner Michael Graves has writt....
Release Date 2013/08 -
VCAP5-DCD Official Cert Guide: VMware Certified Advanced Professional 5-Data Center Design
Author Paul McSharry
The Publisher regrets that the companion CD/DVD content for this title cannot be made available Online.The VCAP5-DCD Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This....
Release Date 2013/08 -
VCP5-DT Official Cert Guide: VMware Certified Professional 5 - Desktop
Author Linus Bourque
The Publisher regrets that the companion CD/DVD content cannot be made available Online.The VCP5-DT Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizze....
Release Date 2013/08