-
Author Russ Hepworth-Sawyer , Mark Cousins
Guiding you through the history and emergence of modern mastering techniques, then providing practical hints and tips on how to use them in your set up, Practical Mastering is the book for anyone interested in tackling this elusive art form. Providing you with sold ....
Release Date 2013/08 -
Hacker Techniques, Tools, and Incident Handling, 2nd Edition
Author Oriyano
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes....
Release Date 2013/08 -
Official (ISC)2® Guide to the ISSAP® CBK, 2nd Edition
Author ² Corporate
Candidates for the CISSP-ISSAP professional certification need to not only demonstratea thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.Supplyi....
Release Date 2013/08 -
Author Melissa M. Stone , Terri D. Barreiro
This book provides a guided deep dive into the early stages of venture development of social entrepreneurship. It introduces concepts that provide important insights necessary for social venture success. It introduces a set of entrepreneurial tools designed for the ....
Release Date 2013/08 -
Designing Trustworthy Organizations
Author Robert F. Hurley , Nicole Gillespie , Donald L. Ferrin , Graham Dietz
In the aftermath of the well-publicized frauds of Enron, WorldCom and Tyco circa 2001 and 2002, there were major efforts in the United States to restore trust and enforce corporate compliance. Among other things, the U.S. Congress passed the Sarbanes-Oxley Act ....
Release Date 2013/07 -
Cryptography InfoSec Pro Guide
Author Sean-Philip Oriyano
Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques.
Release Date 2013/07 -
Hacking Exposed Mobile Security Secrets & Solutions
Author Mike Price , John Steven , Scott Matsumoto , Swapnil Deshmukh , Sarath Geethakumar
Proven security tactics for today’s mobile apps,devices, and networks A great overview of the new threats created by mobile devices.The authors have heaps of experience in the topics and bring that to every chapter. Pro....
Release Date 2013/07 -
Complete Audio Mastering: Practical Techniques
Author Gebre E. Waddell
Learn the art of professional audio mastering"Gebre Waddell covers this all-important subject in greater depth than has ever been done in a book." -- Dave Collins, mastering engineer for The Nightmare Before Christmas, Jurassic Park, Soundgarden, War, Ben Harper, an....
Release Date 2013/07 -
Introduction to Digital Audio, 2nd Edition
Author John Watkinson
Master the basics from first principles: the physics of sound, principles of hearing etc, then progress onward to fundamental digital principles, conversion, compression and coding and then onto transmission, digital audio workstations, DAT and optical disks. ....
Release Date 2013/07 -
Social Work Visions from Around the Globe
Author Anneli Pohjola , Pirkko-Liisa Ranhalon , Teppo Kroger , Anna Metten
Increase the effectiveness of the services you provide to clientsSocial Work Visions from Around the Globe examines the fundamental principles and dilemmas of social work with people whose health is under threat. This valuable resource was compiled from materi....
Release Date 2013/07 -
Sourcing to Support the Green Initiative
Author Lisa Ellram , Wendy Tate
The “green” or environmental sustainability movement has taken hold throughout the world. Its staying power is confirmed by that fact that environmental emphasis in organizations did not decrease during the recent global recession, but rather increased. However, sin....
Release Date 2013/07 -
The Basics of Hacking and Penetration Testing, 2nd Edition
Author Patrick Engebretson
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the result....
Release Date 2013/06 -
Author Josh Pauli
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system....
Release Date 2013/06 -
Sustainable Development and Governance in Europe
Author Thomas C. Hoerber , Pamela M. Barnes
This book analyses the evolution of the sustainability discourse in the European Union, exploring the conditions necessary for sustainable development to move from a conceptual model into a model for action for strategic decision makers at all levels of governance. ....
Release Date 2013/06 -
Local Governance and Poverty in Developing Nations
Author Isa Baud , Nicky Pouw
This volume examines the persistence of poverty - both rural and urban - in developing countries, and the response of local governments to the problem, exploring the roles of governments, NGOs, and CSOs in national and sub-national agenda-setting, policy-making, and....
Release Date 2013/06 -
Routledge Handbook of Constitutional Law
Author Cheryl Saunders , Thomas Fleiner , Mark Tushnet
The Routledge Handbook of Constitutional Law is an advanced level reference work which surveys the current state of constitutional law. Featuring new, specially commissioned papers by a range of leading scholars from around the world, it offers a comprehensive overv....
Release Date 2013/06 -
Land Law Reform in Eastern Africa: Traditional or Transformative?
Author Patrick McAuslan
Land Law Reform in East Africa reviews development and changes in the statutory land laws of 7 countries in Eastern Africa over the period 1961 – 2011. The book is divided into two parts. Part 1 sets up the conceptual framework for consideration of the reforms, and ....
Release Date 2013/06 -
Author Cornelia Schweppe , Wolfgang Schröer , Adrienne Chambon
In the context of ever-increasing globalization, transnational systems of support have emerged in response to the needs of transnational families, labour forces, and the communities within which they are located. This volume will be the first to systematically addre....
Release Date 2013/06 -
Author Kathleen Iannello
Decisions Without Hierarchy is based on a two-year examination of three feminist organizations: a peace group, health collective, and business women's group. From these case studies, Iannello constructs a model of organizations that, while structured, is neverthele....
Release Date 2013/06 -
Author Ray Tricker
This "hands on" book provides practical information on how to cost effectively set up an ISO 9001: 2000 compliant Quality Management System. The new ISO 9000:2000 family is an all-encompassing series of standards that lay down requirements for incorporating the mana....
Release Date 2013/06 -
Author P. Carlo Cacciabue , Erik Hollnagel , Pietro C. Cacciabue , Jean-Michel Hoc
Technological development has changed the nature of industrial production so that it is no longer a question of humans working with a machine, but rather that a joint human machine system is performing the task. This development, which started in the 1940s, ha....
Release Date 2013/06 -
Signals and Systems For Dummies
Author Mark Wickert , PhD
Getting mixed signals in your signals and systems course?The concepts covered in a typical signals and systems course are often considered by engineering students to be some of the most difficult to master. Thankfully, Signals & Systems For Dummies is your intui....
Release Date 2013/06 -
Professional Penetration Testing, 2nd Edition
Author Thomas Wilhelm
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of....
Release Date 2013/06 -
Governance for Sustainable Development
Author Rosalie Callway
As the process of globalization continues and power imbalances between decision-making institutions become increasingly apparent, the need for a critical assessment of the way in which we manage our interaction with the natural environment becomes ever more urg....
Release Date 2013/06 -
Author Janos Gyerik
Primarily written for those who are new to version control systems, this easy-to-follow guide to Bazaar will quickly make you an expert. From basic principles to creating plugins – it’s all here.Gain an understanding of what version control is, and how you can benef....
Release Date 2013/06 -
Author Karthik Ranganath
The art of ethical hacking made easy with MetasploitLearn something new in an Instant! A short, fast, focused guide delivering immediate resultsRapidly develop and execute exploit codes against a remote target machineFocus less on theory and more on results, with cl....
Release Date 2013/06 -
Author Nigel Cross
Since the Stockholm Environment Conference in 1972 and the Rio Summit in 1992, there has been unprecedented public concern for the future of the planet and a growing awareness that development needs to be sustainable. This text charts the growth of these ideas ....
Release Date 2013/06 -
Author Andrew Ruef , Jana Shakarian , Paulo Shakarian
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only fr....
Release Date 2013/05