-
Author Michael E Cohen
Have you ever had to fill out and sign a PDF-based form? Or change the date on a PDF-based flyer? Comment on a document sent around your workplace as a PDF file? Scan a document to PDF and OCR the text? Smile's PDFpen 5 can perform these and many other PDF manipula....
Release Date 2010/10 -
Where Does Social Security Fit Into Your Retirement?
Author Paul B. Brown , Frank Armstrong
This Element is an excerpt from Save Your Retirement: What to Do If You Haven’t Saved Enough or If Your Investments Were Devastated by the Market Meltdown (9780137029006) by Frank Armstrong, III and Paul B. Brown. Available in print and digital formats.A clear-eyed ....
Release Date 2010/09 -
System Forensics, Investigation, and Response
Author K Rudolph , John R. Vacca
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response begins by examining....
Release Date 2010/09 -
Auditing IT Infrastructures for Compliance
Author Michael G. Solomon , Martin Weiss
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Information systems and IT infrastructures are no longer void from governance and compliance given recent U.S.-based compliancy laws that were consummated during the ear....
Release Date 2010/09 -
The Jelly Effect: How to make your communication stick
Author Andy Bounds
Like throwing jelly at a wall, poor communication never sticks.Too much information and not enough relevance is a problem that pervades almost all business communication. So what's the answer? More relevance and a lot less jelly.The Jelly Effect teaches you simple,....
Release Date 2010/09 -
Rebuilding Trust in the Workplace
Author Michelle L. Reina , Dennis S. Reina
If so, you may be experiencing the confidence-busting, commitment-breaking, energy-draining patterns consistent with broken trust. We've all been there, but few of us know how to rebuild that trust. Dennis and Michelle Reina have spent their careers researchin....
Release Date 2010/09 -
Author Peter Sidorko , Steve O’Connor
In this information age it is widely recognised that, in order to maintain relevance and to gain a competitive edge, libraries and other organisations in the business of information must continuously assess their roles, collections, services and perhaps most importa....
Release Date 2010/09 -
Environmental Protection and the Social Responsibility of Firms
Author Richard Professor Vietor , Robert Professor Stavins , Bruce Professor Hay
Everyone agrees that firms should obey the law. But beyond what the law requires-beyond bare compliance with regulations-do firms have additional social responsibilities to commit resources voluntarily to environmental protection? How should we think about firms sac....
Release Date 2010/09 -
Power System Operation and Control
Author N. V. Ramana
Power System Operation and Control is a comprehensive text designed for an undergraduate course in electrical engineering. Written in a simple and easy-to-understand manner, the book introduces the reader to economic operation of power system and reactive power cont....
Release Date 2010/09 -
Author Ben Forta
Written by the best known and most trusted name in the ColdFusion community, Ben Forta, The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time. Volume 3: Advanced Application Development, focuses on application security, sc....
Release Date 2010/08 -
Top-Down Network Design, Third Edition
Author Priscilla Oppenheimer
Top-Down Network DesignThird EditionPriscilla OppenheimerA systems analysis approach to enterprise network designThe authoritative book on designing networks that align with business goalsTop-Down Network Design, Third Edition, is a practical and comprehensive guide....
Release Date 2010/08 -
Author Shon Harris
Don't Let the Real Test Be Your First Test!Written by the leading expert in IT security certification and training, CISSP Practice Exams is filled with hundreds of realistic practice exam questions based on the latest release of the Certified Information Systems Se....
Release Date 2010/07 -
Designing an IAM Framework with Oracle Identity and Access Management Suite
Author Scheidel Jeff
Develop and Implement an End-to-End IAM Solution Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management....
Release Date 2010/07 -
Getting Your Retirement Act Right
Author Trent Hamm
This Element is an excerpt from The Simple Dollar: How One Man Wiped Out His Debts and Achieved the Life of His Dreams (9780137054251) by Trent Hamm. Available in print and digital formats.Retirement: how to start imagining and planning your exciting “next act”!Reti....
Release Date 2010/07 -
Author Richard Watson , Stephen Pearson
Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex....
Release Date 2010/07 -
Option Trading Loss Recovery Strategies
Author Michael C. Thomsett
How options can help you recover losses in stock investments you still want to keep.In volatile markets, inevitable paper losses tie up capital and prevent you from moving ahead. So what do you do? Do you just wait and hope the market price rebounds? Do you cut your....
Release Date 2010/06 -
Author Chris Jackson - CCIE No. 6256
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.Cisco network security expert Chris Jackson begins with a thorough overview ....
Release Date 2010/06 -
Seven Deadliest Network Attacks
Author Mike Borkin , Rob Kraus , Stacy Prowell
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and ....
Release Date 2010/06 -
Unequal Protection, 2nd Edition
Author Thom Hartmann
Unequal taxes, unequal accountability for crime, unequal influence, unequal control of the media, unequal access to natural resources—corporations have gained these privileges and more by exploiting their legal status as persons. How did something so illogical ....
Release Date 2010/06 -
International Social Entrepreneurship
Author Joseph Mark Munoz
The book is attractive to the target readers for the following reasons : 1) there has been a growing interest in the topic of social entrepreneurship and yet there are limited academic materials, this book will offer a concise, straight-forward compilation of theori....
Release Date 2010/06 -
Coping with Unplanned Absences: A Pocket Guide
Author Sarah Cook
Unplanned absence from work could cost the UK economy as much as £12 billion a year! When your organisation can no longer meet its deadlines, or provide customers with the high quality of service they expect, you have a problem. Unplanned absence also has a bad effe....
Release Date 2010/06 -
Author Kim Kerr
Workplace violence in all its forms is becoming more prevalent and pervasive every year. Workplace Violence: Planning for Prevention and Response gives a comprehensive account of the problem using a multi-faceted approach to the issues surrounding workplace violence....
Release Date 2010/05 -
Author Jeff Carlson
Quickly master all the features and functions of the iPad with this handy well-crafted pocket guide. Versatile, portable, powerful, ergonomically and functionally designed, the iPad is the perfect companion for digital media. With photos, music, movies, e-mail, and ....
Release Date 2010/05 -
A Short Overview of Social Networks and Their Uses
Author Juliette Powell
This Element is an excerpt from 33 Million People in the Room: How to Create, Influence, and Run a Successful Business with Social Networking (9780137154357) by Juliette Powell. Available in print and digital formats.Profiling the world of social networks: what you ....
Release Date 2010/05 -
Author Joy R. Butler
If you actively use the internet to advance your business and professional endeavors, you are a cyber citizen and this book is for you. As a good cyber citizen, you want to stay legal online and protect your online interests. The Cyber Citizen’s Guide Th....
Release Date 2010/05 -
A Brief Look at Some Businesses Based on Shared Social Experience
Author Rawn Shah
This Element is an excerpt from Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs (9780132357791) by Rawn Shah. Available in print and digital formats.¿Lessons from some of today’s most innovative social businesses: last.fm, Li....
Release Date 2010/04 -
Adobe® ColdFusion® 9 Web Application Construction Kit, Volume 1: Getting Started
Author Charlie Arehart , Raymond Camden , Ben Forta
Written by the best known and most trusted name in the ColdFusion community, Ben Forta, The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time - the books that most ColdFusion developers used to learn the product. This Gett....
Release Date 2010/04 -
CEH® Certified Ethical Hacker Study Guide
Author Kimberly Graves
Prepare for the new version of CEH certification with this advanced guideOnce you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it'....
Release Date 2010/04 -
Visual Media Coding and Transmission
Author Ahmet Kondoz
This book presents the state-of-the-art in visual media coding and transmissionVisual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields ....
Release Date 2010/04 -
Securing the Borderless Network: Security for the Web 2.0 World
Author Tom Gillis
Securing the Borderless Network: Security for the Web 2.0 WorldTom GillisSecuring the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applicationsToday’s new Web 2.0, virtualization, mobility, tele....
Release Date 2010/04