-
Practical Mobile Forensics - Second Edition
Author Satish Bommisetty , Rohit Tamma , Heather Mahalik
A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platformsAbout This BookGet to grips with the basics of mobile forensics and the various forensic approachesRetrieve and analyze the data stored on mobile devices and on the ....
Release Date 2016/05 -
Practical Mobile Forensics - Third Edition
Author Heather Mahalik , Satish Bommisetty , Oleg Skulkin , Rohit Tamma
Investigate, analyze, and report iOS, Android, and Windows devicesAbout This BookGet hands-on experience in performing simple to complex mobile forensics techniques.Retrieve and analyze data stored not only on mobile devices but also through the cloud and other conn....
Release Date 2018/01 -
Practical Negotiating: Tools, Tactics & Techniques
Author Tom Gosselin
Praise for Practical Negotiating: Tools, Tactics & Techniques"Practical Negotiating is an innovative, resourceful, and-as its name implies-practical guide to the art and science of negotiating. Unlike many books on negotiating, which are filled with theories and....
Release Date 2007/05 -
Author Ajay Singh Chauhan
Get more from your network by securing its infrastructure and increasing its effectivenessAbout This BookLearn to choose the best network scanning toolset for your systemImplement different concepts of network scanning such as port scanning and OS detectionAdapt a ....
Release Date 2018/05 -
Author Roman Zabicki
Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basic....
Release Date 2019/02 -
Practical Threat Intelligence and Data-Driven Threat Hunting
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat h.... -
Practical Web Penetration Testing
Author Gus Khawaja
Learn how to execute web application penetration testing end-to-endAbout This BookBuild an end-to-end threat model landscape for web application securityLearn both web application vulnerabilities and web intrusion testingAssociate network vulnerabilities with a web....
Release Date 2018/06 -
Author Konstantin Sapronov , Ayman Shaaban
Leverage the power of digital forensics for Windows systemsAbout This BookBuild your own lab environment to analyze forensic data and practice techniques.This book offers meticulous coverage with an example-driven approach and helps you build the key skills of perf....
Release Date 2016/06 -
Practitioner's Guide to Program Management
Author Irene Didinsky MBA , PMP
Programs serve as a crucial link between strategy and the execution of business results and organizations implement them to achieve strategic goals. Although the practice of program management has evolved in lockstep with the project management profession, the root....
Release Date 2017/06 -
Predictive Control of Power Converters and Electrical Drives
Author Patricio Cortes , Jose Rodriguez
Describes the general principles and current research into Model Predictive Control (MPC); the most up-to-date control method for power converters and drivesThe book starts with an introduction to the subject before the first chapter on classical control methods for....
Release Date 2012/04 -
Author Kumaraguru Velmurugan , Mounir Hahad , Abhijit Mohanta
Your one-stop guide to know digital extortion and it's prevention.About This BookA complete guide to how ransomware worksBuild a security mechanism to prevent digital extortion.A practical approach to knowing about, and responding to, ransomware.Who This Book Is F....
Release Date 2018/03 -
Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)
Practice the Skills Essential for a Successful Career in Cybersecurity!This hands-on guide contains more than 90 labs that challenge you to solve real-world problems and help you to master key cybersecurity concepts. Clear, measurable lab results map to exam objectives, offering direct correlation t.... -
Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition, 5th Edition
Author Dwayne Williams , Roger L. Davis , Chuck Cothren , Greg White , Wm. Arthur Conklin
Fully updated computer security essentials—quality approved by CompTIALearn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbo....
Release Date 2018/06 -
Principles of Data Management - Facilitating information sharing Second edition
Author Keith Gordon
Data is a valuable corporate asset and its effective management can be vital to an organisation's success. This professional guide covers all the key areas of data management, including database development and corporate data modelling. It is business-focused, prov....
Release Date 2013/11 -
Principles of Digital Audio, Sixth Edition, 6th Edition
Author Ken C. Pohlmann
The definitive guide to digital engineering--fully updatedGain a thorough understanding of digital audio tools, techniques, and practices from this completely revised and expanded resource. Written by industry pioneer and Audio Engineering Society Fellow Ken C. Pohl....
Release Date 2010/10 -
Principles of Microelectromechanical Systems
Author Ki Bang Lee
The building blocks of MEMS design through closed-form solutionsMicroelectromechanical Systems, or MEMS, is the technology of very small systems; it is found in everything from inkjet printers and cars to cell phones, digital cameras, and medical equipment. This boo....
Release Date 2011/02 -
Author Jason A. Scharfman
Develop and manage a private equity compliance program Compliance has become one of the fastest-growing areas in the private equity (PE) space. Mirroring trends from the hedge fund industry, recent surveys indicate that PE managers rank compliance as the single mos....
Release Date 2018/09 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Brad Hibbert , Morey J. Haber
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breache....
Release Date 2017/12 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Morey J. Haber
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization wi....
Release Date 2020/06 -
Author Lawrence E. Hughes
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required backgrou....
Release Date 2022/03 -
Pro Business Activity Monitoring in BizTalk 2009
Author Geoff Snowman , Jeff Sanders
Business Activity Monitoring, or BAM, provides real-time business intelligence by capturing data as it flows through a business system. By using BAM, you can monitor a business process in real time and generate alerts when the process needs human intervention. Pro B....
Release Date 2009/07 -
Pro Encryption in SQL Server 2022: Provide the Highest Level of Protection for Your Data
Author Matthew McGiffen
This in-depth look at the encryption tools available in SQL Server shows you how to protect data by encrypting it at rest with Transparent Data Encryption (TDE) and in transit with Transport Level Security (TLS). You will know how to add the highest levels of protection for sensitive data using Alwa....
Release Date 2022/11 -
Process Systems Engineering for Biofuels Development
A comprehensive overview of current developments and applications in biofuels production Process Systems Engineering for Biofuels Development brings together the latest and most cutting-edge research on the production of biofuels. As the first book specifically devoted to process syst.... -
Procuring Penetration Testing Services
Author CREST
Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat to key systems is ever increasing and the probability of a security weakness being accidentally exposed or malicious....
Release Date 2014/05 -
Professional Penetration Testing
Author Thomas Wilhelm
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability iden....
Release Date 2015/08 -
Professional Penetration Testing, 2nd Edition
Author Thomas Wilhelm
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of....
Release Date 2013/06 -
Profit + Purpose: How Social Innovation Is Transforming Business for Good
Author Kyle Westaway
World-changing ideas become reality with practical, effective planningProfit + Purpose: Tools to Structure, Fund, and Run a Social Enterprise is a practical step-by step guide to creating a successful socially-oriented business venture. With practical, actionable gu....
Release Date 2014/09 -
Programming and Customizing the Multicore Propeller Microcontroller: The Official Guide
Author Parallax
The Only Official Guide to the Parallax Multicore Propeller MicrocontrollerWritten by a team of Propeller experts, this authoritative guide shows you how to realize your design concepts by taking full advantage of the multicore Propeller microcontroller's unique ar....
Release Date 2010/02 -
Programming Mobile Devices: An Introduction for Practitioners
Author Tommi Mikkonen
With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems.Learn how to programme the mobile devices of the future!The importance of mobile systems programming has emerged over the recent years as a new domain in software development. The design of ....
Release Date 2007/03