-
Trust Building and Boundary Spanning in Cross-Border Management
Author Michael Zhang
This edited book addresses two critical issues in international management: building trust and managing boundary spanning activities between international business partners. The duel-process of internationalization of multinational corporations (MNCs), through globalisati....
Release Date 2018/03 -
Author Brian O'Leary , Hugh McGuire
The rapid shakeup--from print to digital buying and reading--is a transitional phase, necessary in order to make the next jump, which is far bigger and more exciting: what happens when all books are truly digital, connected, ubiquitous. We're starting to have the i....
Release Date 2012/08 -
Feedback Control for Computer Systems
Author Philipp K. Janert
How can you take advantage of feedback control for enterprise programming? With this book, author Philipp K. Janert demonstrates how the same principles that govern cruise control in your car also apply to data center management and other enterprise systems. Through....
Release Date 2013/10 -
The Appropriations Law Answer Book
Author William G. Arnold
Avoid Violations of the Antideficiency Act!Antideficiency Act (ADA) violations within both the financial and audit communities are now at an all-time high. Violations often result from a lack of knowledge about what is and what is not permissible under the law....
Release Date 2012/02 -
Author Melissa M. Stone , Terri D. Barreiro
This book provides a guided deep dive into the early stages of venture development of social entrepreneurship. It introduces concepts that provide important insights necessary for social venture success. It introduces a set of entrepreneurial tools designed for the ....
Release Date 2013/08 -
Author Cameron Buchanan
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali LinuxIn DetailAs attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools ar....
Release Date 2014/07 -
Hack the Cybersecurity Interview
Author Ken Underhill , Christophe Foulon , Tia Hopkins , Mari Galloway
Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for cybersecurity job rolesPrepare for SOC analyst, penetra....
Release Date 2022/07 -
OPNsense Beginner to Professional
Author Julio Cesar Bueno de Camargo
Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey FeaturesLearn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party plugins such as Nginx and SenseiGrasp hands-on exa....
Release Date 2022/06 -
Mahara ePortfolios Beginner's Guide
Author Derrin Kent , Thomas Bell , Richard Hand
Create your own e-Portfolio and Communities of Interest within an Educational or Professional Organization with this book and ebook.A step-by-step approach that takes you through examples with ample screenshots and clear explanationsCreate, customize, and maintain....
Release Date 2012/07 -
Instant Penetration Testing: Setting Up a Test Lab How-to
Author Vyacheslav Fadyushin
Set up your own penetration testing lab, using practical and precise recipesLearn something new in an Instant! A short, fast, focused guide delivering immediate results.A concise and clear explanation of penetration testing, and how you can benefit from itUnderstand....
Release Date 2013/03 -
How to Use Web 2.0 and Social Networking Sites Securely
Author IT Governance Research Team
This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.
Release Date 2009/01 -
Author Karen Pearlman
How does a film editor make decisions about where and when to cut in order to make a film 'feel right'? Generally speaking, the answer is, 'it's intuitive', which is accurate but leaves one wanting to know more. Cutting Rhythms breaks down the definition of int....
Release Date 2012/08 -
Systems Engineering Principles and Practice, 2nd Edition
Author Steven M. Biemer , Samuel J. Seymour , William N. Sweet , Alexander Kossiakoff
The Bestselling Guide to the Engineering of Complex Systems, Now Thoroughly UpdatedThe first edition of this unique interdisciplinary guide has become the foundational systems engineering textbook for colleges and universities worldwide. It has helped countless rea....
Release Date 2011/05 -
Social Work Visions from Around the Globe
Author Anneli Pohjola , Pirkko-Liisa Ranhalon , Teppo Kroger , Anna Metten
Increase the effectiveness of the services you provide to clientsSocial Work Visions from Around the Globe examines the fundamental principles and dilemmas of social work with people whose health is under threat. This valuable resource was compiled from materi....
Release Date 2013/07 -
Author P. Carlo Cacciabue , Erik Hollnagel , Pietro C. Cacciabue , Jean-Michel Hoc
Technological development has changed the nature of industrial production so that it is no longer a question of humans working with a machine, but rather that a joint human machine system is performing the task. This development, which started in the 1940s, ha....
Release Date 2013/06 -
Supervision and Safety of Complex Systems
Author Jean Arlat , Yves Vandenboomgaerde , Nada Matta
This book presents results of projects carried out by both scientific and industry researchers into the techniques to help in maintenance, control, supervision and security of systems, taking into account the technical environmental and human factors.This work is su....
Release Date 2012/10 -
Complex Systems and Systems of Systems Engineering
Author Jean-Luc Wippler , Jean-René Ruault , Dominique Luzeaux
With the growing maturity of information and communication technologies, systems have been interconnected within growing networks, yielding new services through a combination of the system functionalities. This leads to an increasing complexity that has to be manage....
Release Date 2011/10 -
The Antivirus Hacker's Handbook
Author Elias Bachaalany , Joxean Koret
Hack your antivirus software to stamp out future vulnerabilitiesThe Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future ....
Release Date 2015/09 -
Alice and Bob Learn Application Security
Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development.... -
Digital Painting, 37 Intermediate Tricks and Techniques
Author Gary Tonge
"Make the most of your digital artwork. State-of-the-art advice from Gary Tonge, one of the world’s leading digital art pros, covers every aspect of computer-generated art—from combining a range of source material into one cohesive image to adding super realistic ef....
Release Date 2011/11 -
Author Anmol Misra , James Ransome
"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."—Dr. Dena Haritos Tsamiti....
Release Date 2013/12 -
Federal IT Capital Planning and Investment Control (with CD)
Author Patricia A. Kelley , Thomas G. Kessler
Reduce risk and improve the overall performance of IT assets! Federal IT Capital Planning and Investment Control is the first book to provide a comprehensive look at the IT capital planning and investment control (CPIC) process. Written from a practitioner's ....
Release Date 2008/03 -
Router Security Strategies: Securing IP Network Traffic Planes
Author David J. Smith - CCIE No. 1986 , Gregg Schudel - CCIE No. 9591
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced tech....
Release Date 2007/12 -
Securing the Borderless Network: Security for the Web 2.0 World
Author Tom Gillis
Securing the Borderless Network: Security for the Web 2.0 WorldTom GillisSecuring the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applicationsToday’s new Web 2.0, virtualization, mobility, tele....
Release Date 2010/04 -
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
Author Vijay Kumar Velu
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers.About This BookEmploy advanced pentesting techniques with Kali Linux to build highly-secured systemsGet to grips with various stealth techn....
Release Date 2017/06 -
Windows and Linux Penetration Testing from Scratch - Second Edition
Author Phil Bramwell
Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python, turning Kali Linux into your fighter cockpitKey FeaturesMap your client's attack surface with Kali LinuxDiscover the craft of shellcode injection and managing multiple compromises in the en....
Release Date 2022/08 -
The Ultimate Kali Linux Book - Second Edition
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchPurchase of the print or Kindle book includes a free eBook in the PDF formatKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using a....
Release Date 2022/02 -
Digital Video Surveillance and Security
Author Anthony C. Caputo
Digital Video Surveillance & Security provides a blueprint for the IP-based electronic security system clients need, allowing security professionals to protect their client's place of business or home. The author gives detailed plans on the best camera position....
Release Date 2010/03 -
Web 2.0: Principles and Best Practices
Author John Musser
Web 2.0 Principles and Best Practices
Release Date 2006/11 -
Author Vincent Liu , Bryan Sullivan
Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks.This....
Release Date 2011/11