-
Metasploit Penetration Testing Cookbook
Author Abhinav Singh
Over 80 recipes to master the most widely used penetration testing framework with this book and ebook.More than 80 recipes/practicaltasks that will escalate the reader’s knowledge from beginner to an advanced level Special focus on the latest operating systems, expl....
Release Date 2012/06 -
Architecting Mobile Solutions for the Enterprise
Author Dino Esposito
Your guide to planning and executing a complete mobile web strategyRevisit your approach to the mobile web—and deliver effective solutions that reach customers and clients on a variety of mobile devices. In this practical guide, web development luminary Dino Esposit....
Release Date 2012/05 -
CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105, 3rd Edition
Author David A. Westcott , David D. Coleman
Newly updated edition of this top-selling CWNA study guideSybex is the official publisher for CWNP, Inc., the organization behind the the CWNA certification. The new edition of Sybex's top-selling CWNA Study Guide covers the latest CWNA Exam, PW0-105. If you're pr....
Release Date 2012/05 -
Cyber Forensics: From Data to Digital Evidence
Author Albert J. Marcella , Frederic Guillossou
An explanation of the basic principles of dataThis book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operati....
Release Date 2012/05 -
Cyber Conflict: Competing National Perspectives
Author Daniel Ventre
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace cou....
Release Date 2012/05 -
Malware Forensics Field Guide for Windows Systems
Author James M. Aquilina , Eoghan Casey , Cameron H. Malin
Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital ....
Release Date 2012/05 -
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Author Lee Allen
Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook.Learn how to perform an efficient, organized, and effective penetration test from start to finishGain hands-on penetration t....
Release Date 2012/05 -
Author James Forsythe , Burton Goldberg
Cancer rates continue to skyrocket, and the overall survival rate for Stage IV cancer patients in the United States is a grim 2.1 percent. Clearly, the extensive use of expensive, sometimes ineffective toxins in conventional oncology protocols is a failing strategy.....
Release Date 2012/05 -
Wireless Network Security: A Beginner’s Guide
Author Tyler Wrightson
Security Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and....
Release Date 2012/04 -
Cyber Security Policy Guidebook
Author Joseph Weiss , Jeffrey Schmidt , Marcus H. Sachs , Paul Rohmeyer , Jason Healey , Jen
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers ....
Release Date 2012/04 -
Predictive Control of Power Converters and Electrical Drives
Author Patricio Cortes , Jose Rodriguez
Describes the general principles and current research into Model Predictive Control (MPC); the most up-to-date control method for power converters and drivesThe book starts with an introduction to the subject before the first chapter on classical control methods for....
Release Date 2012/04 -
Hands-On Ethical Hacking and Network Defense
Author James E. Corley , Kent Backman , Michael T. Simpson
It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related ....
Release Date 2012/04 -
Applying Social Tools to Learning
Author Dave Wilkins
With social learning, the whole company is part of the learning and development team. This Infoline will show you how to strategically design effective and agile social learning strategies that address the unique needs of various learning initiatives. Learn about th....
Release Date 2012/04 -
The Basics of Digital Forensics
Author John Sammons
The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to ....
Release Date 2012/04 -
OHSAS 18001 Step by Step: A Practical Guide
Author Naeem Sadiq
An essential guide to OHSAS 18001 We say 'take care' as we wave our loved ones goodbye in the morning, but how often is this message taken into the workplace? In this easy-to-understand and timely pocket guide, Naeem Sadiq, examines the Understanda as it gears ....
Release Date 2012/04 -
Microsoft Windows Identity Foundation Cookbook
Author Sandeep Chanda
Over 40 recipes to master claims-based identity and access control in .NET applications using Windows Identity Foundation, Active Directory Federation Services, and AppFabric Access Control ServicesGain a firm understanding of Microsoft’s Identity and Access Control....
Release Date 2012/04 -
Foundation Version Control for Web Developers
Author Ian Oxley , Chris Kemper
Foundation Version Control for Web Developers explains how version control works, what you can do with it and how. Using a friendly and accessible tone, you will learn how to use the three leading version control systems—Subversion, Git and Mercurial—on multiple ope....
Release Date 2012/03 -
Linux Pocket Guide, 2nd Edition
Author Daniel J. Barrett
If you use Linux in your day-to-day work, this popular pocket guide is the perfect on-the-job reference. The second edition has expanded from Fedora-only coverage to distro-neutral, with practical information on a wider range of commands requested by readers. For no....
Release Date 2012/03 -
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2nd Edition
Author Blunden
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopti....
Release Date 2012/03 -
Introduction to Random Signals and Applied Kalman Filtering with Matlab Exercises, 4th Edition
Author Patrick Y. C. Hwang , Robert Grover Brown
The Fourth Edition to the Introduction of Random Signals and Applied Kalman Filtering is updated to cover innovations in the Kalman filter algorithm and the proliferation of Kalman filtering applications from the past decade. The text updates both the research advan....
Release Date 2012/02 -
CASP: CompTIA® Advanced Security Practitioner, Study Guide
Author Michael Gregg
Get Prepared for CompTIA Advanced Security Practitioner (CASP) ExamTargeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused....
Release Date 2012/02 -
Getting Started with OAuth 2.0
Author Ryan Boyd
Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data....
Release Date 2012/02 -
The Appropriations Law Answer Book
Author William G. Arnold
Avoid Violations of the Antideficiency Act!Antideficiency Act (ADA) violations within both the financial and audit communities are now at an all-time high. Violations often result from a lack of knowledge about what is and what is not permissible under the law....
Release Date 2012/02 -
Author Andrew Honig , Michael Sikorski
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software t....
Release Date 2012/02 -
Accountability: Angst, Awareness, Action
Author Jay P. Desai
This book was written to increase the public understanding of 'accountability'. The author constructs a three-dimensional lens with which he examines the mechanisms that hold our governance institutions accountable. Desai explains why a burst of governance reforms....
Release Date 2012/02 -
Author Randall F. Trzeciak , Andrew P. Moore , Dawn M. Cappelli
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade sec....
Release Date 2012/01 -
Author Mark D. Wolfinger
In an era where “buy and hold” investment strategies no longer work, investors desperately need portfolio protection. Fortunately, it’s available—in the form of options. In Why Trade Options? top trader and options instructor Mark D. Wolfinger shows how options can ....
Release Date 2012/01 -
Author Behrooz Mashadi , David Crolla
The powertrain is at the heart of vehicle design; the engine – whether it is a conventional, hybrid or electric design – provides the motive power, which is then managed and controlled through the transmission and final drive components. The overall powertra....
Release Date 2012/01 -
Author Max Muller
Human resource law is a complex, confusing compilation of federal, state, county and city laws and ordinances cured in the crucible of the courtroom. The Legal Side of HR Practice leads human resources professionals, managers, supervisors, and students through the ....
Release Date 2012/01 -
Managing Complexity of Information Systems: The Value of Simplicity
Author Mederic Morel , Pirmin P. Lemberger
This book is about complexity in Information Systems (IS). The subject is addressed from both conceptual and applied perspectives. Concepts are drawn from information theory, industrial design and software engineering. Its content capitalizes on experiences gathered....
Release Date 2012/01