-
CISSP Practice Questions Exam Cram, Third Edition
Author Michael Gregg
The Publisher regrets that the CD/DVD content for this title cannot be made available Online.CISSP Practice Questions Exam Cram, Third Edition complements any CISSP study plan with 1,001 practice test questions in the book—all supported by complete explanations of e....
Release Date 2012/09 -
Introduction to Digital Video, 2nd Edition
Author John Watkinson
Covers the essential fundamentals of digital video: from video principles, to conversion, compression, coding, interfaces and output. Written for television professionals needing to apply digital video systems, equipment and techniques to multimedia and /or di....
Release Date 2012/09 -
Author Lloyd Kaufman
This is the 3rd volume in Mr. Kaufman's hilarious, how-to series for hard-working self-starters and hard-laughing, cheeky filmmakers. "Sell Your Own Damn Movie!" covers everything you need to do to get your finished film seen by festival-goers, movie-goers, DVD-buy....
Release Date 2012/09 -
EnCE EnCase Computer Forensics: The Official EnCase Certified Examiner Study Guide, 3rd Edition
Author Steve Bunting
The official, Guidance Software-approved book on the newest EnCE exam!The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation methodologies, as well as the use of Guidance Software's EnCase Forensic 7. The o....
Release Date 2012/09 -
DAVID BUSCH’S NIKON® D800/D800E GUIDE TO DIGITAL SLR PHOTOGRAPHY
Author David D. Busch
Are you looking for a sure, complete guide to your new Nikon D800/D800E? If so, DAVID BUSCH'S NIKON D800/D800E GUIDE TO DIGITAL SLR PHOTOGRAPHY is the perfect companion for you. The Nikon D800/D800E is the long-anticipated replacement for Nikon's D700 full-frame (....
Release Date 2012/09 -
11 Rules for Creating Value in the Social Era
Author Nilofer Merchant
The era of social technologies provides seemingly endless opportunity, both for individuals and organizations. But it’s also the subject of seemingly endless hype. Yes, social tools allow us to do things entirely differently—but how do you really capitalize on that?....
Release Date 2012/09 -
The JOBS Act: Crowdfunding for Small Businesses and Startups
Author William Michael Cunningham
On April 5, 2012, President Barack Obama signed the Jumpstart Our Business Startups Act, better known as the JOBS Act. The act is designed to "reopen American capital markets to small companies," defined in the act as Emerging Growth Companies. This is one of the mo....
Release Date 2012/09 -
Author Katie Cunningham
Get practical guidelines for making your website accessible to people with disabilities. With this handbook, you’ll learn how to design or develop a site that conforms to Section 508 of the US Rehabilitation Act—and in the process you’ll discover how to provide a be....
Release Date 2012/09 -
Business Continuity Management Systems - Implementation and certification to ISO 22301
Author Hilary Estall
This practical guide is written for organisations who are implementing a business continuity management system and certification in line with ISO 22301. It will prove invaluable for those new to business continuity management or to management systems. Enriched with....
Release Date 2012/09 -
From Science 2.0 to Pharma 3.0
Author Denise Silber , David Stuart , Hervé Basset
Science 2.0 uses the resources of Web 2.0 to communicate between scientists, and with the general public. Web 3.0, in turn, has brought disruptive technologies such as semantic search, cloud computing and mobile applications into play. The term Pharma 3.0 anticipate....
Release Date 2012/09 -
Hacking Exposed 7: Network Security Secrets & Solutions
Author George Kurtz , Joel Scambray , Stuart McClure
A fully updated edition of the world’s bestselling computer security bookHacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persisten....
Release Date 2012/08 -
Author N. K. McCarthy
Based on proven, rock-solid computer incident response plansThe Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence. The book....
Release Date 2012/08 -
From Oz to Kansas: Almost Every Black and White Conversion Technique Known to Man
Author Vincent Versace
The ability to create a stunning black and white image remains one of photography’s greatest and most aspirational skills. Being able to "see" in black and white is an enviable capability, and a well-crafted black and white photograph remains the finest of the fine ....
Release Date 2012/08 -
The Focal Easy Guide to Adobe Audition 2.0
Author Antony Brown
Software packages are complex. Shouldn't software books make it easier? Simplify your life with the Focal Easy Guide to Adobe ® Audition ® 2.0! This short, full-color book lives up to its name by paring down the software to its essentials. It covers only the key f....
Release Date 2012/08 -
Author Karen Pearlman
How does a film editor make decisions about where and when to cut in order to make a film 'feel right'? Generally speaking, the answer is, 'it's intuitive', which is accurate but leaves one wanting to know more. Cutting Rhythms breaks down the definition of int....
Release Date 2012/08 -
CISSP For Dummies, 4th Edition
Author Peter Gregory , Lawrence Miller
A fully updated guide to CISSP certificationCISSP certification is the most prestigious and highly valued of the security certifications. This is the book you need to approach the exam with confidence and become CISSP certified! The CISSP Body of Knowledge underwent....
Release Date 2012/08 -
Author Brian O'Leary , Hugh McGuire
The rapid shakeup--from print to digital buying and reading--is a transitional phase, necessary in order to make the next jump, which is far bigger and more exciting: what happens when all books are truly digital, connected, ubiquitous. We're starting to have the i....
Release Date 2012/08 -
Author Andrea Simmons
Understand the role of Information Security ManagersYour responsibilities as an information security manager are critical. Advising on protecting the organisation's assets, security and data systems, not to mention its reputation, are in your hands. A major securit....
Release Date 2012/08 -
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Author Gregory Carpenter , Sean Bodmer , Jade Jones , Jeff Jones , Dr. Max Kilger
A complete guide to understanding and fighting advanced persistent threats—today's most destructive risk to enterprise securityReverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize the....
Release Date 2012/07 -
Continuity Supervisor, 4th Edition
Author Avril Rowlands
The Continuity Supervisor is a practical guide to the basics of continuity, designed to be of use both to the newcomer and those more experienced. Formerly titled 'The Continuity Handbook: a guide for single-camera shooting, this new edition covers the latest....
Release Date 2012/07 -
Author David D. Busch
DAVID BUSCH'S NIKON D3200 GUIDE TO DIGITAL SLR PHOTOGRAPHY is your onestop resource and reference for the Nikon D3200, the latest entrylevel DSLR in the Nikon product line, featuring a 16.2 megapixel sensor, full HDTV video, and ISO up to 12,800. With this book in ....
Release Date 2012/07 -
The Future of Boards: Meeting the Governance Challenges of the Twenty-First Century
Author Jay Lorsch
Edited by Harvard Business School professor Jay W. Lorsch, the preeminent authority on corporate boards, this book gathers the leading voices from business and academia to address the challenges of governance in the 21st century.We are at a crucial juncture in the e....
Release Date 2012/07 -
Author Michael E Cohen
Join expert Mac writer Michael E. Cohen as he helps you enjoy the power of TextExpander 3, the award-winning text expansion utility from Smile. If you're a TextExpander newbie, you'll learn how to create "snippets" of text (like your address) that you can insert i....
Release Date 2012/07 -
SOA Governance in Action: REST and Web Service Architectures
Author Jos Dirksen
SummarySOA Governance in Action is a hands-on guide for developers and technology leads who need to develop and implement policies for SOA projects. This book introduces the fundamentals of good governance, the best practices for implementing them, and how to suppor....
Release Date 2012/07 -
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud
Author Lee Newcombe
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud Every Cloud should have a secure lining Cloud Computing represents a major change to the IT services landscape. Cloud services, such as SalesForce, Amazon Web Services® and Microsoft....
Release Date 2012/07 -
Mahara ePortfolios Beginner's Guide
Author Derrin Kent , Thomas Bell , Richard Hand
Create your own e-Portfolio and Communities of Interest within an Educational or Professional Organization with this book and ebook.A step-by-step approach that takes you through examples with ample screenshots and clear explanationsCreate, customize, and maintain....
Release Date 2012/07 -
Network Forensics: Tracking Hackers through Cyberspace
Author Jonathan Ham , Sherri Davidoff
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadm....
Release Date 2012/06 -
Mastering Windows Network Forensics and Investigation, 2nd Edition
Author Scott Pearson , Ryan Johnson , Steve Bunting , Steven Anson
An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personn....
Release Date 2012/06 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
Penetration Testing: Protecting Networks and Systems
Author Kevin M. Henry
Preparation for the Certified Penetration Testing Engineer (CPTE) examination Penetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack. The Certifie....
Release Date 2012/06