-
Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition
Author Aamir Lakhani , Joseph Muniz
Investigating the Cyber BreachThe Digital Forensics Guide for the Network EngineerUnderstand the realities of cybercrime and today’s attacksBuild a digital forensics lab to test tools and methods, and gain expertiseTake the right actions as soon as you discover a b....
Release Date 2018/02 -
Modeling and Modern Control of Wind Power
Author Yuanzhang Sun , Qiuwei Wu
An essential reference to the modeling techniques of wind turbine systems for the application of advanced control methodsThis book covers the modeling of wind power and application of modern control methods to the wind power control—specifically the models of type ....
Release Date 2018/02 -
Author David Seidl , Mike Chapple
1,000 practice questions for smart CompTIA CySA+ preparationCompTIA CySA+ Practice Tests provides invaluable preparation for the Cybersecurity Analyst exam CS0-001. With 1,000 questions covering 100% of the exam objectives, this book offers a multitude of opportuni....
Release Date 2018/02 -
CCSP Official (ISC)2 Practice Tests
Author Ben Malisow
The only official CCSP practice test product endorsed by (ISC)²With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before....
Release Date 2018/02 -
Author Helen Q Huang
Character Sketch outlines a theory of costume rendering that explores how a designer conceptualizes and creates a character on the page. Beginning with how to develop a sense of character through active, gestural poses, this book explores and explains the process o....
Release Date 2018/02 -
Analytical Solutions for Two Ferromagnetic Nanoparticles Immersed in a Magnetic Field
Author Gehan Anthonys , Richard C. Dorf
The investigation of the behavior of ferromagnetic particles in an external magnetic field is important for use in a wide range of applications in magnetostatics problems, from biomedicine to engineering. To the best of the author's knowledge, the systematic analysis for....
Release Date 2018/02 -
Penetration Testing with Shellcode
Author Hamza Megahed
Master Shellcode to leverage the buffer overflow conceptAbout This BookUnderstand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and MetasploitLearn to write and modify 64-bit shellcode along with kernel-level s....
Release Date 2018/02 -
Metasploit Penetration Testing Cookbook - Third Edition
Author Monika Agarwal , Abhinav Singh , Daniel Teixeira
Over 100 recipes for penetration testing using Metasploit and virtual machinesAbout This BookSpecial focus on the latest operating systems, exploits, and penetration testing techniquesLearn new anti-virus evasion techniques and use Metasploit to evade countermeasure....
Release Date 2018/02 -
Web Penetration Testing with Kali Linux - Third Edition
Author Juned Ahmed Ansari , Gilberto Najera-Gutierrez
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holesAbout This BookKnow how to set up your lab with Kali LinuxDiscover the core concepts of web penetration testin....
Release Date 2018/02 -
Advanced Infrastructure Penetration Testing
Author Chiheb Chebbi
A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructureAbout This BookAdvanced exploitation techniques to breach modern operating systems and complex network....
Release Date 2018/02 -
Author J. Stuart Bunderson , Bret Sanner
Research on social species shows that hierarchies are important for group functioning. Human beings also have a tendency to think and act hierarchically. In fact, hierarchies — distinct differences in group members' power and status — can be found in v....
Release Date 2018/01 -
Surviving a Day Without Smartphones
Author Massimo Bergami , Gabriele Morandin , Marcello Russo
For young adults accustomed to continually checking their cellphones, even a single day without access to them can be anxiety-producing. What are the implications for executives about managing this constantly connected generation – and their devices – i....
Release Date 2018/01 -
Author Jamie Pride
The real-world secrets to startup successUnicorn Tears is the smart entrepreneur’s guide to startups. A full 92% of startups fail in the first three years — but failure is not inevitable. Most of these companies self-sabotage, unconsciously eliminating any chance a....
Release Date 2018/01 -
Modelling Optimization and Control of Biomedical Systems
Author Eirini G. Velliou , Ioana Nascu , Efstratios N. Pistikopoulos
Shows the newest developments in the field of multi-parametric model predictive control and optimization and their application for drug delivery systems This book is based on the Modelling, Control and Optimization of Biomedical Systems (MOBILE) project, which was ....
Release Date 2018/01 -
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501), 5th Edition
Author Roger L. Davis , Chuck Cothren , Dwayne Williams , Greg White , Wm. Arthur Conklin
This fully updated study guide covers every topic on the current version of the CompTIA Security+ examTake the latest version of the CompTIA Security+ exam with complete confidence using the detailed information contained in this highly effective self-study system.....
Release Date 2018/01 -
Social Development Through Benevolent Business
Author Kalyan Sankar Mandal
This book points out that apart from usual “profit- maximizing business,”, there are some other types of business models which that serve social causes with profit. The author discusses some such business models, namely, social business, compassionate b....
Release Date 2018/01 -
Cybersecurity - Attack and Defense Strategies
Author Erdal Ozkaya , Yuri Diogenes
Enhance your organization's secure posture by improving your attack and defense strategiesAbout This BookGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.Learn to unique te....
Release Date 2018/01 -
Mastering Linux Security and Hardening
Author Donald A. Tevault
A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.About This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such a....
Release Date 2018/01 -
Practical Mobile Forensics - Third Edition
Author Heather Mahalik , Satish Bommisetty , Oleg Skulkin , Rohit Tamma
Investigate, analyze, and report iOS, Android, and Windows devicesAbout This BookGet hands-on experience in performing simple to complex mobile forensics techniques.Retrieve and analyze data stored not only on mobile devices but also through the cloud and other conn....
Release Date 2018/01 -
Author Toomas Viira
"I loved the quotes at the beginning of each chapter – very interesting and thought-provoking. I also enjoyed the author’s style and his technical expertise shone through," Christopher Wright, Wright CandA Consulting Ltd. Protecting critical information infra....
Release Date 2018/01 -
Cisco Firepower Threat Defense (FTD)
Author Nazmul Rajib
The authoritative visual guide to Cisco Firepower Threat Defense (FTD)This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower....
Release Date 2017/12 -
CompTIA® Security+ SY0-501 Cert Guide, Academic Edition, Second Edition
Author David L. Prowse
Learn, prepare, and practice for CompTIA Security+ SY0-501 exam success with this full-color CompTIA Authorized Cert Guide, Academic Edition from Pearson IT Certification, a leader in IT Certification learning. This book includes access to four complete practice te....
Release Date 2017/12 -
The Disaster Recovery Handbook, 3rd Edition
Author Lawrence Webber , Michael Wallace
Expect the best. Plan for the worst.Survey the headlines: superstorms, data breaches, pandemics, system failures, and strikes occur regularly...somewhere. If a disaster hits your organization — will you be prepared? With the detailed guidance found in The Disaster ....
Release Date 2017/12 -
Author Camilo Olaya , César García-Díaz
Uniquely reflects an engineering view to social systems in a wide variety of contexts of applicationSocial Systems Engineering: The Design of Complexity brings together a wide variety of application approaches to social systems from an engineering viewpoint. The bo....
Release Date 2017/12 -
CompTIA Security+ Review Guide, 4th Edition
Author James M. Stewart
Consolidate your knowledge base with critical Security+ reviewCompTIA Security+ Review Guide, Fourth Edition, is the smart candidate's secret weapon for passing Exam SY0-501 with flying colors. You've worked through your study guide, but are you sure you're prep....
Release Date 2017/12 -
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501), 2nd Edition
Author Scott Jernigan , Mike Meyers
A fully updated CompTIA Security+ exam guide from training and exam preparation expert Mike MeyersTake the CompTIA Security+ exam (exam SY0-501) with confidence using the comprehensive information contained in this highly effective study resource. Like the exam, th....
Release Date 2017/12 -
Visual Cryptography and Secret Image Sharing
Author Ching-Nung Yang , Stelvio Cimato
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography ....
Release Date 2017/12 -
End-to-End Adaptive Congestion Control in TCP/IP Networks
Author George A. Rovithakis , Christos N. Houmkozlis
Establishing adaptive control as an alternative framework to design and analyze Internet congestion controllers, End-to-End Adaptive Congestion Control in TCP/IP Networks employs a rigorously mathematical approach coupled with a lucid writing style to provide extens....
Release Date 2017/12 -
Intelligent Automatic Generation Control
Author Takashi Hiyama , Hassan Bevrani
Automatic generation control (AGC) is one of the most important control problems in the design and operation of interconnected power systems. Its significance continues to grow as a result of several factors: the changing structure and increasing size, complexity, a....
Release Date 2017/12 -
Nonlinear H-Infinity Control, Hamiltonian Systems and Hamilton-Jacobi Equations
Author M.D.S. Aliyu
A comprehensive overview of nonlinear H∞ control theory for both continuous-time and discrete-time systems, Nonlinear H∞-Control, Hamiltonian Systems and Hamilton-Jacobi Equations covers topics as diverse as singular nonlinear H∞-control, nonlinear H∞ -filtering, mi....
Release Date 2017/12