-
Anomaly Detection for Monitoring
Author Baron Schwartz , Preetam Jinka
Monitoring, the practice of observing systems and determining if they're healthy, is hard--and getting harder. In a perfect world, your anomaly detection system would warn you about new behaviors and data patterns in time to fix problems before they happened, and ....
Release Date 2016/03 -
Who Are the Bad Guys and What Do They Want?
Author Mike Barlow , Gregory Fell
Recent breaches at the Internal Revenue Service are a stark reminder that cyber crime is alive and well. According to Center for Strategic and International Studies, cyber crime and cyber espionage cost the global economy between $375 billion and $575 billion annua....
Release Date 2016/03 -
Information Security Auditor - Careers in information security
Author Wendy Goucher
Identifying security gaps in an organisation’s information systems is a first and vital step in protecting data and information. This is what makes the role of an information security (or assurance) auditor so important. However, this is a role that is often malign....
Release Date 2016/03 -
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Author Kevin Cardwell , Lee Allen
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environmentsAbout This BookLearn how to build your own pentesting lab environment to practice advanced techniquesCustomize your own scripts, and learn methods to exploit 32....
Release Date 2016/03 -
Building a Pentesting Lab for Wireless Networks
Author Andrey Popov , Vyacheslav Fadyushin
Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniquesAbout This BookDesign and build an extendable penetration testing lab with wireless access suitable for home and enterprise useFill the lab with various compo....
Release Date 2016/03 -
Mobile Application Penetration Testing
Author Vijay Kumar Velu
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter themAbout This BookGain insights into the current threat landscape of mobile applications in particularExplore the different options that are available on mobile platforms and ....
Release Date 2016/03 -
Cryptography and Network Security
Author S. Bose , Ajay Kumar
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map th....
Release Date 2016/03 -
Implementing Digital Forensic Readiness
Author Jason Sachowski
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organizati....
Release Date 2016/02 -
Interpretation and Application of IPSAS
Author Isabelle Andernack , Caroline Aggestam-Pontoppidan
Clear, practical IPSAS guidance, explanation, and examplesInterpretation and Application of IPSAS provides practical guidance on the implementation and application of the International Public Sector Accounting Standards. This book brings readers up to date on the s....
Release Date 2016/02 -
Author William L. Sparks , Peter C. Browning
Directors: Improve Board PerformanceThe Director's Manual: A Framework for Board Governance offers current and aspiring board members essential up-to-date governance guidance that blends rigorous research-based information with the wisdom found only through practi....
Release Date 2016/02 -
Social Movements for Good: How Companies and Causes Create Viral Change
Author Derrick Feldmann
Create real change in the new social movement paradigmSocial Movements for Good is a guidebook for driving change, by taking advantage of the social "currency" that makes movements go viral. Author Derrick Feldmann has spent a career showing organizations how to be....
Release Date 2016/02 -
Organizational Enablers for Project Governance
Author Sofia Pemsel , Jingting Shao , Ralf Muller
While corporate culture plays a significant role in the success of any corporation, governance and “governmentality” not only determine how business should be conducted, but also define the policies and procedures organizations follow to achieve busines....
Release Date 2016/02 -
Author Samir Datt
Identify and safeguard your network against both internal and external threats, hackers, and malware attacksAbout This BookLay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network trafficConnect th....
Release Date 2016/02 -
Kali Linux Web Penetration Testing Cookbook
Author Gilberto Nájera-Gutiérrez
Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2About This BookFamiliarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of themSet up a penetra....
Release Date 2016/02 -
Mastering Kali Linux Wireless Pentesting
Author Brian Sak , Jilumudi Raghu Ram
Test your wireless network's security and master advanced wireless penetration techniques using Kali LinuxAbout This BookDevelop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive in....
Release Date 2016/02 -
The Long-Tail Strategy of IT Outsourcing
Author Ravi Aron , Julia Kotlarsky , Ilan Oshri , Kunsoo Han , Vijay Gurbaxani , Rudy Hirsch
Today’s rapid technological changes have transformed the role of global IT outsourcing in companies’ strategies. Traditionally viewed as a cost-saving measure, IT outsourcing is also increasingly being leveraged as a strategic tool for acquiring cutting....
Release Date 2016/01 -
Warding Off the Threat of Disruption
Author Joshua S. Gans , Daniel Cohen
In a fast-changing digital landscape, companies shouldn't wait too long to reconfigure their offerings — but they also should be wary of moving to an untested technology too soon. Monitoring trends in related industries and identifying high-potential startup....
Release Date 2016/01 -
Dragon Professional Individual For Dummies
Author Stephanie Diamond
Stop typing and get more done with Dragon Professional Individual voice recognition softwareTired of typing, but afraid to take the leap into voice recognition software? No problem! Dragon Professional Individual For Dummies, 5th Edition gives you a great overview ....
Release Date 2016/01 -
Boundary Element Techniques in Engineering
Author S. Walker , C. A. Brebbia
Boundary Element Techniques in Engineering deals with solutions of two- and three-dimensional problems in elasticity and the potential theory where finite elements are inefficient. The book discusses approximate methods, higher-order elements, elastostatics, time-de....
Release Date 2016/01 -
Governance of Portfolios, Programs, and Projects: A Practice Guide
Author Project Management Institute
Understanding governance as it applies to portfolios, programs, and projects is growing in importance to organizations, because appropriate governance is a factor in the success or failure of strategic initiatives and portfolios, as well as an organization’s ....
Release Date 2016/01 -
Learning iOS Penetration Testing
Author Swaroop Yermalkar
Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration testsAbout This BookAchieve your goal to secure iOS devices and applications with the help of this fast paced manualFind vulnerabilities in your iOS applications and fix them w....
Release Date 2016/01 -
I'm Not Afraid of GDPI, 2nd Edition
Author Tuhina Anukul Varshney
In today's cut throat competitive world, an enhanced personality, excellent communication and GDPI skills are essential facets of job seeking candidates to land the best jobs. I'm Not Afraid of GDPI, 2e comprehensively deals with every aspect of the hiring proce....
Release Date 2016/01 -
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
Author Dawn Dunkerley , Bob E. Rogers
An all-new exam guide for the industry-standard information technology risk certification, Certified in Risk and Information Systems Control (CRISC)Prepare for the newly-updated Certified in Risk and Information Systems Control (CRISC) certification exam with this ....
Release Date 2015/12 -
CISSP Study Guide, 3rd Edition
Author Joshua Feldman , Seth Misenar , Eric Conrad
CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more j....
Release Date 2015/12 -
Author John Sammons
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad rang....
Release Date 2015/12 -
Author Krisa Tailor
In The Patient Revolution, author Krisa Tailor—a noted expert in health care innovation and management—explores, through the lens of design thinking, how information technology will take health care into the experience economy. In the experience economy, patients w....
Release Date 2015/12 -
Hacking For Dummies, 5th Edition
Author Kevin Beaver
Learn to hack your own system to protect against malicious attacks from outsideIs hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your ne....
Release Date 2015/12