-
Ethical Health Informatics, 3rd Edition
Author Harman
Ethical Informatics is an invaluable resource for HIM, the healthcare team (nursing, physical therapy, occupational therapy et al.), information technology (IT) students (associate, baccalaureate and graduate) and practitioners. Each chapter includes ethical “....
Release Date 2015/12 -
Author Karen Pearlman
There are many books on the technical aspects of film and video editing. Much rarer are books on how editors think and make creative decisions.Filled with timeless principles and thought-provoking examples from a variety of international films, the second edition o....
Release Date 2015/12 -
Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Author Noel Rivera , Richard Bedwell , William Wilson , Chris Carthern
This book is a one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification preparation. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions fo....
Release Date 2015/12 -
Digital Audio Editing Fundamentals
Author Wallace Jackson
This concise book builds upon the foundational concepts of MIDI, synthesis, and sampled waveforms. It also covers key factors regarding the data footprint optimization work process, streaming versus captive digital audio new media assets, digital audio programming a....
Release Date 2015/12 -
Digital Illustration Fundamentals
Author Wallace Jackson
This fun, concise, full color book introduces the fundamentals of digital illustration, and covers how to develop and optimize these types of scalable vector graphics (SVG) using Inkscape 0.91 or later. It also covers concepts central to digital painting using the ....
Release Date 2015/12 -
Essential Cybersecurity Science
Author Josiah Dykstra
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to con....
Release Date 2015/12 -
The Little Book of HTML/CSS Coding Guidelines
Author Jens Oliver Meiert
A proper plan can improve your code, including your HTML documents and CSS style sheets. Jens Oliver Meiert explores the theory and practice of coding guidelines and shows, using Google’s HTML and CSS standards as a particular example, how consistency and care can ....
Release Date 2015/12 -
Strategies for University Management
Author Neal King , J. Mark Munoz
The state of affairs of contemporary higher education has been described as chaotic, highly competitive, and constrained with institutional roadblocks and bureaucracy. Despite obstacles, several academic leaders defied conventional wisdom and took on an aggressive ....
Release Date 2015/12 -
Author Charles Bihis
Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkAbout This BookLearn how to use the OAuth 2.0 protocol to interact with the world's most popular ....
Release Date 2015/12 -
Learning Network Programming with Java
Author Richard M Reese
Harness the hidden power of Java to build network-enabled applications with lower network traffic and faster processesAbout This BookLearn to deliver superior server-to-server communication through the networking channelsGain expertise of the networking features of....
Release Date 2015/12 -
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation
Author Lee Reiber
This in-depth guide reveals the art of mobile forensics investigation with comprehensive coverage of the entire mobile forensics investigation lifecycle, from evidence collection through advanced data analysis to reporting and presenting findings.Mobile Forensics I....
Release Date 2015/11 -
Author Linda Frederiksen
Within most libraries in the United States today there is an information professional who has become the ‘go-to’ person for grasping and grappling with copyright questions. While not an attorney, this librarian has developed an awareness and understanding of copyri....
Release Date 2015/11 -
Author Ric Messier
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, t....
Release Date 2015/11 -
Google Hacking for Penetration Testers, 3rd Edition
Author Justin Brown , Bill Gardner , Johnny Long
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade sec....
Release Date 2015/11 -
Shared Memory Application Programming
Author Victor Alessandrini
Shared Memory Application Programming presents the key concepts and applications of parallel programming, in an accessible and engaging style applicable to developers across many domains. Multithreaded programming is today a core technology, at the basis of all sof....
Release Date 2015/11 -
Author Zhaoyu Pian , Xiangping Meng
Intelligent Coordinated Control of Complex Uncertain Systems for Power Distribution and Network Reliability discusses the important topics revolving around the control of complex uncertain systems using the intelligent coordination control mechanism, a topic ....
Release Date 2015/11 -
Thinking Security: Stopping Next Year’s Hackers
Author Steven M. Bellovin
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re a....
Release Date 2015/11 -
The Official (ISC)2 Guide to the SSCP CBK, 3rd Edition
Author Steven Hernandez , Adam Gordon
The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is one of the most popular and ideal credential for those wanting to expand their security career and highlight their security skills. If you are looking to embark on the journey towards your (....
Release Date 2015/11 -
The Official (ISC)2 Guide to the CCSP CBK
Author Adam Gordon
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2® Guide to the CCSPSM CBK® is your ticket for expert ....
Release Date 2015/11 -
Advances in Communications-Based Train Control Systems
Author F. Richard Yu
With rapid population explosion, improving rail transit speed and capacity is strongly desirable around the world. Communication-based train control (CBTC) is an automated train control system using high capacity bidirectional train-ground communications to ensure ....
Release Date 2015/11 -
Author Esther Swilley
Do you know anyone who does not own a mobile device? Consumers use mobile devices not only for communicating but for shopping as well. Searching for product information, inquiring about services, comparing prices, and purchasing make-up are just some of the shoppin....
Release Date 2015/11 -
Author Diana Heeb Bivona , J. Mark Munoz
Managerial forensics is the practice of gathering relevant corporate information for the purpose of analyzing and identifying reasons for managerial obstacles, mismanagement, bankruptcy, and corporate demise. This book assembles a cast of leading academic and busin....
Release Date 2015/11 -
Web Penetration Testing with Kali Linux - Second Edition
Author Juned Ahmed Ansari
Build your defense against web attacks with Kali Linux 2.0About This BookGain a deep understanding of the flaws in web applications and exploit them in a practical mannerGet hands-on web application hacking experience with a range of tools in Kali Linux 2.0Develop ....
Release Date 2015/11 -
Validating Your Business Continuity Plan: Ensuring your BCP actually works
Author Robert Clark
75% of companies without a business continuity plan fail within three years. Disruptive incidents can affect any organization and occur at any moment. ICT outages, cyber attacks, natural disasters, terrorist attacks, pandemics, supply chain failures and other unex....
Release Date 2015/11 -
Developing the Next Generation of Enterprise Leaders
Author M. Ellen Peebles , Douglas Ready
A survey of top business executives from major international organizations found that 79% said it was extremely important to have leaders who act on behalf of the entire organization, not just their units. The rest said it was very important. Nearly 65% said they e....
Release Date 2015/10 -
Next-Generation Video Coding and Streaming
Author Benny Bing
Reviews the new High Efficiency Video Coding (HEVC) standard and advancements in adaptive streaming technologies for use in broadband networks and the InternetThis book describes next-generation video coding and streaming technologies with a comparative assessment ....
Release Date 2015/10 -
Introduction to Network Security, 2nd Edition
Author Zachary A. Kissel , Jie Wang
Introductory textbook in the important area of network security for undergraduate and graduate studentsComprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee securityFully updated to reflect....
Release Date 2015/10 -
Managing and Engineering Complex Technological Systems
Author Shuki Stauber , Avigdor Zonnenshain
Presents the origins and evolution of the systems engineering discipline and helps readers gain a personal familiarity with systems engineering experts: their experience, opinions and attitudes in this fieldThis book is based on a qualitative study that includes do....
Release Date 2015/10 -
SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285
Author John Gay , Alex Tatistcheff , Todd Lammle
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prepSecuring Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives. With clear and conci....
Release Date 2015/10 -
SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition, 2nd Edition
Author Darril Gibson
This fully-updated, integrated self-study system offers complete coverage of the revised 2015 Systems Security Certified Practitioner (SSCP) exam domainsThoroughly revised for the April 2015 exam update, SSCP Systems Security Certified Practitioner All-in-One Exam ....
Release Date 2015/10