-
Modeling and Control for Micro/Nano Devices and Systems
Author Guangyong Li , Mingjun Zhang , Ning Xi
Micro/nano-scale engineering—especially the design and implementation of ultra-fast and ultra-scale energy devices, sensors, and cellular and molecular systems—remains a daunting challenge. Modeling and control has played an essential role in many technological brea....
Release Date 2017/12 -
Advances in High-Performance Motion Control of Mechatronic Systems
Author Chee Khiang Pang , Mitsuo Hirata , Takashi Yamaguchi
Mechatronic systems are used in a range of consumer products from large-scale braking systems in vehicular agents to small-scale integrated sensors in mobile phones. To keep pace in the competitive consumer electronics industry, companies need to continuously improv....
Release Date 2017/12 -
Computer-Aided Control Systems Design
Author Cheng Siong Chin
Computer-Aided Control Systems Design: Practical Applications Using MATLAB® and Simulink® supplies a solid foundation in applied control to help you bridge the gap between control theory and its real-world applications. Working from basic principles, the book delves....
Release Date 2017/12 -
Cooperative Control of Multi-Agent Systems
Author Zhisheng Duan , Zhongkui Li
Distributed controller design is generally a challenging task, especially for multi-agent systems with complex dynamics, due to the interconnected effect of the agent dynamics, the interaction graph among agents, and the cooperative control laws. Cooperative Control....
Release Date 2017/12 -
Discrete-Time Inverse Optimal Control for Nonlinear Systems
Author Fernando Ornelas-Tellez , Edgar N. Sanchez
Discrete-Time Inverse Optimal Control for Nonlinear Systems proposes a novel inverse optimal control scheme for stabilization and trajectory tracking of discrete-time nonlinear systems. This avoids the need to solve the associated Hamilton-Jacobi-Bellman equation an....
Release Date 2017/12 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Brad Hibbert , Morey J. Haber
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breache....
Release Date 2017/12 -
How Did I Not See This Coming?: A New Manager's Guide to Avoiding Total Disaster
Author Katy Tynan
Julie’s having a very bad day. She’s a new manager, and her top performer has resigned to escape her, and her own manager is looking on with a skeptical eye. . . . This is the story of her turnaround. Being a first-time manager is a tough job. If you ....
Release Date 2017/12 -
Kali Linux Wireless Penetration Testing Cookbook
Author Sean-Philip Oriyano
Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposesAbout This BookExpose wireless security threats through the eyes of an attacker,Recipes to help you proactively identify vulnerabilities and apply intelligent remediation,Acqu....
Release Date 2017/12 -
Author Darren Death
Implement information security effectively as per your organization's needs.About This BookLearn to build your own information security framework, the best fit for your organizationBuild on the concepts of threat modeling, incidence response, and security analysis....
Release Date 2017/12 -
Metasploit Revealed: Secrets of the Expert Pentester
Author Nipun Jaswal , Sagar Rahalkar
Exploit the secrets of Metasploit to master the art of penetration testing.About This BookDiscover techniques to integrate Metasploit with the industry's leading toolsCarry out penetration testing in highly-secured environments with Metasploit and acquire skills t....
Release Date 2017/12 -
Digital Forensics with Kali Linux
Author Shiva V.N. Parasram
Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using this comprehensive guideAbout This BookMaster powerful Kali Linux tools for digital investigation and analysisPerform evidence acquisition, preservation, and analys....
Release Date 2017/12 -
Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition
Author Vivek Ramachandran , Cameron Buchanan
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack.About This BookLearn wireless penetration testi....
Release Date 2017/12 -
Systems, Automation and Control
Author Olfa Kanoun , Faouzi Derbel , Nabil Derbel
The fifth volume of the Series Advances in Systems, Signals and Devices, is dedicated to fields related to Systems, Automation and Control. The scope of this issue encompasses all aspects of the research, development and applications of the science and technology i....
Release Date 2017/12 -
Author Tsinghua University Tsinghua University Press , Dengguo Feng
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such ....
Release Date 2017/12 -
Certified Information Systems Auditor (CISA) Cert Guide
Author Robert Johnson , Michael Gregg
Certification allows you to succeed on the latest CISA exam the first time, mastering all the knowledge you need to earn CISA certification. Worldrenowned enterprise IT security leaders Michael Gregg and Rob Johnson share preparation hints and test-taking tips, hel....
Release Date 2017/11 -
CompTIA Security+ Certification Study Guide, Third Edition (Exam SY0-501), 3rd Edition
Author Glen E. Clarke
This fully updated, exam-focused study aid covers everything you need to know and shows you how to prepare for the CompTIA Security+ examThoroughly revised to cover every objective on the latest version of the CompTIA Security+ exam (SY0-501), this powerful self-st....
Release Date 2017/11 -
Mike Meyers' CompTIA Security+ Certification Passport, Fifth Edition (Exam SY0-501), 5th Edition
Author Dawn Dunkerley
This quick review, cram-style study guide offers 100% coverage of every topic on the latest version of the CompTIA Security+ examThis powerful exam preparation resource presents an accelerated review of the pertinent technology and covers all objectives for the Com....
Release Date 2017/11 -
Character Costume Figure Drawing, 3rd Edition
Author Tan Huaixiang
Character Costume Figure Drawing is an essential guide that will improve your drawing skills and costume renderings. Step-by-step visuals illustrate the how-tos of drawing body parts, costumes, accessories, faces, children, and different character archetypes, such ....
Release Date 2017/11 -
Big Data Analytics with Applications in Insider Threat Detection
Author Latifur Khan , Mohammad Mehedy Masud , Pallabi Parveen , Bhavani Thuraisingham
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malwa....
Release Date 2017/11 -
Corporate Governance in Action
Author Lars Engwall
Over time we have seen large corporations, in many cases with multinational operations, begin to play an increasingly significant role in modern society. This in turn has put the governance of these corporations into focus.Against this background, Corporate Governa....
Release Date 2017/11 -
Author Jean-Philippe Aumasson
"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, bl....
Release Date 2017/11 -
Author Everardo Reyes-Garcia
Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is rendered on the scr....
Release Date 2017/11 -
ISO 37001: An Introduction to Anti-Bribery Management Systems
Author Alan Field
When is a gift not a gift? When it’s a bribe. For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? Bribes, incentives and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, corpo....
Release Date 2017/11 -
The Trouble With Corporate Compliance Programs
Author Maurice E. Stucke , David Wasieleski , John Dienhart , Sean J. Griffith , Tom R. Tyl
Multinational corporations spend millions of dollars per year on compliance. In highly regulated industries, such as health care and finance, large companies spend much more, sometimes hiring hundreds or even thousands of compliance officers at a time. There is oft....
Release Date 2017/10 -
CompTIA® Security+ SY0-501 Cert Guide
Author David L. Prowse
This is the most comprehensive core study tool for CompTIA's latest Security+ exam. Perfect for every candidate preparing for this challenging exam, its comprehensive coverage offers all the information and insight readers need to succeed. From start to finish, th....
Release Date 2017/10 -
CompTIA Security+ Study Guide, 7th Edition
Author Chuck Easttom , Emmett Dulaney
Expert preparation covering 100% of Security+ exam SY0-501 objectivesCompTIA Security+ Study Guide, Seventh Edition offers invaluable preparation for Exam SY0-501. Written by an expert author team, this book covers 100% of the exam objectives with clear, concise ex....
Release Date 2017/10 -
Security from First Principles
Author Susan Sons , Craig Jackson , Scott Russell
Today, a spate of best practices guides, checklists, policies, and standards pervade nearly every part of information security practice. Some are well thought out and well written, others less so. How do you evaluate them? This report explores the Information Secur....
Release Date 2017/10 -
Benefit Corporation Law and Governance
Author Frederick Alexander
Corporations with a ConscienceCorporations today are embedded in a system of shareholder primacy. Nonfinancial concerns—like worker well-being, environmental impact, and community health—are secondary to the imperative to maximize share price. Benefit corporat....
Release Date 2017/10 -
Author Claire-Michelle Smyth
Within Europe, employment law has grown as a result of regional rather than national legislation. The European Union has been at the fore of developing a comprehensive framework to protect workers from unfair practices and discrimination. In addition to the Europea....
Release Date 2017/10