-
Author Steve Schroeder
The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber Criminals provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. The materials presented offer a wealth of in....
Release Date 2011/02 -
Author Steven Bolt
XBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console — it streams movies, connects with social networking sites and chatrooms, transfer files, and more — it just may contain evide....
Release Date 2011/02 -
Gray Hat Hacking The Ethical Hacker’s Handbook
Author Jonathan Ness , Chris Eagle , Shon Harris , Gideon Lenkey , Allen Harper , Terron Wil
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker'....
Release Date 2011/01 -
CCNP Security Firewall 642-617 Quick Reference
Author Andrew Mason
As a final exam preparation tool, the CCNP Security Firewall 642-617 Quick Reference provides a concise review of all objectives on the new CCNP Security Firewall exam (642-617). This eBook provides you with detailed, graphical-based information, highlighting only t....
Release Date 2011/01 -
CISSP®: Certified Information Systems Security Professional Study Guide, Fifth Edition
Author Mike Chapple , Ed Tittel , James Michael Stewart
Totally updated for 2011, here's the ultimate study guide for the CISSP examConsidered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive stu....
Release Date 2011/01 -
Advanced BlackBerry 6 Development
Author Chris King
BlackBerry devices and applications are selling by the millions. As a BlackBerry developer, you need an advanced skill set to successfully exploit the most compelling features of the platform. This book will help you develop that skill set and teach you how to creat....
Release Date 2011/01 -
The Manager's Pocket Guide to Mega Thinking and Planning
Author Roger Kaufman
Our world is changing and changeable. Do you know where your organization is headed? Can you justify why you should go there? And provide the criteria for judging your progress and success? This pocket guide helps you through the process of creating a better future ....
Release Date 2011/01 -
The Art of Successful Information Systems Outsourcing
Author David Gefen
This book is unique in that it does not simply discuss an author's practitioner experience or present a summary of academic research on what makes projects succeed. Rather, this book does not hide the real complexity of the issue and does not attempt to introduce t....
Release Date 2011/01 -
Computer Incident Response and Product Security
Author Damir Rajnović
Learn how to build a Security Incident Response team with guidance from a leading SIRT from CiscoGain insight into the best practices of one of the foremost incident response teamsMaster your plan for building a SIRT (Security Incidence Response Team) with detailed ....
Release Date 2010/12 -
The Disaster Recovery Handbook, 2nd Edition
Author Lawrence WEBBER , Michael WALLACE
Terrorist attacks. Data assaults. Natural catastrophes. Disease outbreaks. Recent years have taught us that not only was 9/11 not just a single, horrible occurrence, but that events of many types can—and statistically will—hit organizations of every size....
Release Date 2010/12 -
Fuzzy Control and Identification
Author John H. Lilly
This book gives an introduction to basic fuzzy logic and Mamdani and Takagi-Sugeno fuzzy systems. The text shows how these can be used to control complex nonlinear engineering systems, while also also suggesting several approaches to modeling of complex engineering ....
Release Date 2010/12 -
Official (ISC)2 Guide to the SSCP CBK, 2nd Edition
Author Harold F. Tipton , J Dewar , R Anderson
The (ISC) Systems Security Certified Practitioner (SSCP ) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselli....
Release Date 2010/12 -
AAA Identity Management Security
Author Brandon J. Carroll , - CCIE #23837 , Premdeep Banga , - CCIE #21713 , Vivek Santuka
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACSAAA solutions are very frequently used by customers to provide secure access to devices and networksAAA solutions are difficult and confusing ....
Release Date 2010/12 -
Author Paul Kearney
Deploy information security across the businessKnowing about information security is not enough. You also have to deploy it across the business - which means convincing management of its importance. Learn how with this essential guide!Information technology plays a ....
Release Date 2010/12 -
The Truth About Computer Scams
Author Steve Weisman
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.What you must know about Internet scams: from phishing and Trojan horses to fake death threats!After installed on your computer, T....
Release Date 2010/11 -
Author Steve Weisman
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.Don’t be the easiest victim! Simple, practical ways to significantly reduce the chances that you’ll be scammed.There are things th....
Release Date 2010/11 -
Fundamentals of Information Systems Security
Author Michael G. Solomon , David Kim
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Fundamentals of Information System Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems....
Release Date 2010/11 -
Security Strategies in Windows Platforms and Applications
Author Michael G. Solomon
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! More than 90 percent of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks aga....
Release Date 2010/11 -
CompTIA Security+ SY0-201 Cert Guide
Author David L. Prowse
CompTIA® Security+ SY0-201 Cert GuideDavid L. ProwseDVD Features Complete Practice ExamMaster every topic on CompTIA’s new Security+ SY0-201 exam.Assess your knowledge and focus your learning.Get the practical workplace knowledge you need!Start-to-finish Security+ S....
Release Date 2010/11 -
The Official New Features Guide to Sybase ASE 15
Author Carrie King Taylor , Steve Bradley , Naresh Adurty , Brian Taylor
Sybase Adaptive Server Enterprise 15 is a high-performance, mission-critical database management system designed to meet the increasing demands of large databases and high-transaction volumes, while providing a cost-effective database management system. The Off....
Release Date 2010/11 -
Principles of Digital Audio, Sixth Edition, 6th Edition
Author Ken C. Pohlmann
The definitive guide to digital engineering--fully updatedGain a thorough understanding of digital audio tools, techniques, and practices from this completely revised and expanded resource. Written by industry pioneer and Audio Engineering Society Fellow Ken C. Pohl....
Release Date 2010/10 -
HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
Author Sima Caleb , Liu Vincent , Scambray Joel
The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today’s hacker. Written by recognized security practitioners and thought leaders, ....
Release Date 2010/10 -
Author Tony Crescenzi
What happens now? Economics in an age when fiscal stimulus can’t be funded and no longer works.After Lehman fell, the scope of the financial crisis became so great that only the fiscal and monetary authorities possessed balance sheets large enough to resolve it. But....
Release Date 2010/10 -
Social Innovation, Inc.: 5 Strategies for Driving Business Growth through Social Change
Author Jason Saul
Could Wal-Mart offer a better solution to healthcare than Medicaid? Could GE help reduce global warming faster than the Kyoto protocol?Social Innovation, Inc. declares a new era where companies profit from social change. Leading corporations like GE, Wellpoint, Trav....
Release Date 2010/10 -
Access Control, Authentication, and Public Key Infrastructure
Author Tricia Ballad , Bill Ballad , Erin Banks
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and pr....
Release Date 2010/10 -
Security Policies and Implementation Issues
Author Mark Merkow , Robert Johnson
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! The study of information system security concepts and domains is an essential part of the education of computer science students and professionals alike. Security Polic....
Release Date 2010/10 -
Hacker Techniques, Tools, and Incident Handling
Author Michael Gregg , Sean-Philip Oriyano
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about ....
Release Date 2010/10 -
Legal Issues in Information Security
Author Joanna Lyn Grama
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are n....
Release Date 2010/10 -
Security Strategies in Web Applications and Social Networking
Author Mike Harwood
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Web Applications and Social Networking provides a unique, in-depth look at how to secure mobile users as customer-facing information migrates fro....
Release Date 2010/10 -
Author Kurt W. MORTENSEN
Some people have the ability to enter a room and draw instant attention, effortlessly exuding charm, radiating energy and a commanding presence. That enviable quality is called charisma…and those who have it are better able to influence what gets done and....
Release Date 2010/10