-
A Guide to Effective Internal Management System Audits
Author Andrew Nichols
Are your internal audits adding value?Organizations hoping to comply with any of the International Standards for management systems (e.g. ISO9001, ISO27001) must carry out internal audits. However, the requirements set down by accreditation bodies for auditor course....
Release Date 2014/06 -
Author LID Editorial
Who you know has always been as important as what you know, and social or business networks (that is, groups of people connecting together with a common interest) have existed since time began. Your connections can help with everything from business deals or career ....
Release Date 2014/06 -
Computer Forensics and Digital Investigation with EnCase Forensic v7
Author Suzanne Widup
Conduct repeatable, defensible investigations with EnCase Forensic v7Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to d....
Release Date 2014/05 -
Author Allan Johnson
31 Days Before Your CCNA Routing and Switching Exam offers you a personable and practical way to understand the certification process, commit to taking the 200-101 Interconnecting Cisco Networking Devices Part 2 (ICND2) certification exam, and finish your preparati....
Release Date 2014/05 -
Author Stephen Trachtenberg , Susan R. Pierce
Revamp senior administration organization for more effective governanceGovernance Reconsidered: How Boards, Presidents, Administrators, and Faculty Can Help Their Colleges Thrive takes an in-depth look at the current practice of governance in higher education and ex....
Release Date 2014/05 -
CompTIA Security+ Study Guide: SY0-401, 6th Edition
Author Chuck Easttom , Emmett Dulaney
Join over 250,000 IT professionals who've earned Security+ certificationIf you're an IT professional hoping to progress in your career, then you know that the CompTIA Security+ exam is one of the most valuable certifications available. Since its introduction in 20....
Release Date 2014/05 -
CompTIA Security+ Review Guide: Exam SY0-401, 3rd Edition
Author James M. Stewart
Focused review for the CompTIA Security+ certification examThe CompTIA Security+ certification offers tremendous opportunities for IT professionals. For those who want to take their careers to the next level, CompTIA Security+ Review Guide: Exam SY0-401 is here to s....
Release Date 2014/05 -
The Scientification of Religion
Author Kocku von Stuckrad
The enigmatic relation between religion and science still presents a challenge to European societies and to ideas about what it means to be ‘modern.’ This book argues that European secularism, rather than pushing back religious truth claims, in fact has been religi....
Release Date 2014/05 -
Author Nipun Jaswal
With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.In DetailThe Metasploit framework has been around f....
Release Date 2014/05 -
CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition
Author Julie Mehan
Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same – but the outcomes can be equally devastating. Each can cause s....
Release Date 2014/05 -
Procuring Penetration Testing Services
Author CREST
Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat to key systems is ever increasing and the probability of a security weakness being accidentally exposed or malicious....
Release Date 2014/05 -
Penetration Testing Services Procurement Guide
Author CREST
Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities.It presents a useful over....
Release Date 2014/05 -
Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition
Author Michael Krausz
What if you suffer an information security breach?Many titles explain how to reduce the risk of information security breaches. Nevertheless breaches do occur, even to organisations that have taken all reasonable precautions. Information Security Breaches - Avoidance....
Release Date 2014/05 -
IBM Information Governance Solutions
Author Sandeep Shah , Erik A O'neill , Marc Haber , Christopher Giardina , Gary Brunell
Managing information within the enterprise has always been a vital and important task to support the day-to-day business operations and to enable analysis of that data for decision making to better manage and grow the business for improved profitability. To do all t....
Release Date 2014/04 -
CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 2nd Edition
Author Matt Walker
Thoroughly revised for the latest release of the Certified Ethical Hacker (CEH) v8 certification examFully updated for the CEH v8 exam objectives, this comprehensive guide offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new editi....
Release Date 2014/04 -
Social Engineering Penetration Testing
Author Richard Ackroyd , Andrew Mason , Gavin Watson
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and e....
Release Date 2014/04 -
Author Richard Enbody , Aditya Sood
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and....
Release Date 2014/04 -
Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Author Andrew Ossipov , Omar Santos , Jazib Frahim
Cisco® ASAAll-in-One Next-Generation Firewall, IPS, and VPN Services, Third EditionIdentify, mitigate, and respond to today’s highly-sophisticated network attacks.Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA:....
Release Date 2014/04 -
The Effect of Temperature and other Factors on Plastics and Elastomers, 3rd Edition
Author Laurence W. McKeen
This reference guide brings together a wide range of critical data on the effect of temperature on plastics and elastomers, enabling engineers to make optimal material choices and design decisions. The effects of humidity level and strain rate on mechanical and elec....
Release Date 2014/04 -
Information Governance: Concepts, Strategies, and Best Practices
Author Robert F. Smallwood
Proven and emerging strategies for addressing document and records management risk within the framework of information governance principles and best practicesInformation Governance (IG) is a rapidly emerging "super discipline" and is now being applied to electronic....
Release Date 2014/04 -
Tax Planning and Compliance for Tax-Exempt Organizations, Fifth Edition 2014 Cumulative Supplement
Author Jody Blazek
The cumulative supplement to the Tax Planning and Compliance for Tax-Exempt Organizations, 5th EditionNonprofit organizations including health and welfare organizations, colleges and universities, private foundations, churches, libraries, museums, cultural instituti....
Release Date 2014/04 -
Kali Linux – Assuring Security by Penetration Testing
Author Shakeel Ali , Lee Allen , Tedi Heriyanto
With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals.In DetailKali Linux is a comprehe....
Release Date 2014/04 -
Author Chris C. Ducker
Entrepreneurs often suffer from superhero syndromethe misconception that to be successful, they must do everything themselves. Not only are they the boss, but also the salesperson, HR manager, copywriter, operations manager, online marketing guru, and so much more. ....
Release Date 2014/04 -
Information Governance Principles and Practices for a Big Data Landscape
Author Harald Smith , Barry Rosen , Bill Plants , Ivan Milman , Tom Jesionowski , Cindy Comp
This IBM® Redbooks® publication describes how the IBM Big Data Platform provides the integrated capabilities that are required for the adoption of Information Governance in the big data landscape.As organizations embark on new use cases, such as Big Data Exploration....
Release Date 2014/03 -
Author Heather Mansfield
"Even if you can only invest 5 staff hours and a mobile and social media budget of $1,000 annually, your nonprofit must invest in mobile and social media." -- Heather MansfieldMobile devices are fast becoming the #1 means of digital communication. If you want a sust....
Release Date 2014/03 -
Security Program and Policies: Principles and Practices, Second Edition
Author Sari Greene
Everything you need to know about information security programs and policies, in one bookClearly explains all facets of InfoSec program and policy planning, development, deployment, and managementThoroughly updated for today’s challenges, laws, regulations, and best....
Release Date 2014/03 -
Geopolitics and Expertise: Knowledge and Authority in European Diplomacy
Author Merje Kuus
Geopolitics and Expertise is an in-depth exploration of how expert knowledge is created and exercised in the external relations machinery of the European Union.Provides a rare, full-length work on transnational diplomatic practiceBased on a rigorous and empirical st....
Release Date 2014/03 -
Social Entrepreneurship: An Evidence-Based Approach to Creating Social Value
Author Wolfgang Bielefeld , Chao Guo
Social entrepreneurship explainedSocial entrepreneurship is a hot topic in public and non-profit management. Organizations everywhere are looking for innovative ways to respond to financial, social, and regulatory pressures. The next generation of transformative lea....
Release Date 2014/03