-
Author Debra Golden , Margaret Murphy
You don't need to be a professional trainer to deliver a great training session. With a basic knowledge of adult learner preferences and instructional design, anyone can deliver engaging and useful training. This Infoline is designed with the "occasional" trainer i....
Release Date 2008/05 -
Top-Down Network Design, Third Edition
Author Priscilla Oppenheimer
Top-Down Network DesignThird EditionPriscilla OppenheimerA systems analysis approach to enterprise network designThe authoritative book on designing networks that align with business goalsTop-Down Network Design, Third Edition, is a practical and comprehensive guide....
Release Date 2010/08 -
Tools for Signal Compression: Applications to Speech and Audio Coding
Author Nicolas Moreau
This book presents tools and algorithms required to compress/uncompress signals such as speech and music. These algorithms are largely used in mobile phones, DVD players, HDTV sets, etc.In a first rather theoretical part, this book presents the standard tools used i....
Release Date 2011/05 -
Tissue Engineering, 2nd Edition
Author Jan De Boer , Clemens Van Blitterswijk
Tissue Engineering is a comprehensive introduction to the engineering and biological aspects of this critical subject. With contributions from internationally renowned authors, it provides a broad perspective on tissue engineering for students coming to the subject ....
Release Date 2014/12 -
Tissue Engineering Using Ceramics and Polymers, 2nd Edition
Author P.X. Ma , Aldo R Boccaccini
The second edition of Tissue Engineering Using Ceramics and Polymers comprehensively reviews the latest advances in this area rapidly evolving area of biomaterials science. Part one considers the biomaterials used for tissue engineering. It introduces the properties....
Release Date 2014/06 -
TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001
Author Shawn Porter , Debra Littlejohn Shinder , Mike Chapple
TICSA (TruSecure ICSA Computer Security Associate) is a popular new entry-level computer security certification aimed at individuals with 2 or more years of computer security experience or training equivalent to 48 hours in a 24 month period. TICSA represents base l....
Release Date 2002/09 -
Author Matthew J. Coles , Izar Tarandach
Threat modeling is one of the most essential—and most misunderstood—parts of the development lifecycle. Whether you’re a security practitioner or application developer, this book will help you gain a better understanding of core concepts and how to apply them to yo....
Release Date 2020/09 -
Author Chris Peiris , Binil Pillai , Abbas Kudrati
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting prosIn Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Bi....
Release Date 2021/10 -
Author Michael Collins
Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company’s network. In many organizations, security analysts initiate threat hunting when they spot something weird—network conditions or activ....
Release Date 2018/05 -
Author Will Gragido , Iain Davison , David DeSanto , John Pirc
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting....
Release Date 2016/05 -
Thinking Security: Stopping Next Year’s Hackers
Author Steven M. Bellovin
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re a....
Release Date 2015/11 -
Theoretical Cybersecurity: Principles and Advanced Concepts
Author Jacob G. Oakley , Michael Butler , Wayne York , Matthew Puckett , J. Louis Sewell
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract an....
Release Date 2022/07 -
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Author Marcus Pinto , Dafydd Stuttard
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in ....
Release Date 2007/10 -
The Ultimate Kali Linux Book - Second Edition
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchPurchase of the print or Kindle book includes a free eBook in the PDF formatKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using a....
Release Date 2022/02 -
Author J. Stuart Bunderson , Bret Sanner
Research on social species shows that hierarchies are important for group functioning. Human beings also have a tendency to think and act hierarchically. In fact, hierarchies — distinct differences in group members' power and status — can be found in v....
Release Date 2018/01 -
The Truth About Computer Scams
Author Steve Weisman
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.What you must know about Internet scams: from phishing and Trojan horses to fake death threats!After installed on your computer, T....
Release Date 2010/11 -
Author Russell von Frank
Trust, it binds us together in our deepest most fulfilling relationships, attracts and retains the best employees, and turns clients into raving fans. Let me show you how to heal old wounds, become a sought out business leader to work for, and create a loyal following of ....
Release Date 2020/11 -
The Trouble With Corporate Compliance Programs
Author Maurice E. Stucke , David Wasieleski , John Dienhart , Sean J. Griffith , Tom R. Tyl
Multinational corporations spend millions of dollars per year on compliance. In highly regulated industries, such as health care and finance, large companies spend much more, sometimes hiring hundreds or even thousands of compliance officers at a time. There is oft....
Release Date 2017/10 -
The Technological Entrepreneur’s Playbook
Author Ian Chaston
As exemplified by Apple and Google, maximizing the wealth of organizations involves what Joseph Schumpeter described as “creative destruction.” This occurs when scientific or technological breakthroughs lead to the launch of a radically new product or se....
Release Date 2017/05 -
The Technical and Social History of Software Engineering
Author Capers Jones
“Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data. Now, Capers performs yet another invaluable service to our industry, by documenting, for the first time, i....
Release Date 2013/11 -
Author Amy Sample Ward , Afua Bruce
Changing the way we use, develop, and fund technology for social change is possible, and it starts with you. The Tech That Comes Next: How Changemakers, Philanthropists, and Technologists Can Build an Equitable World outlines a vision of a more equitable and just world along with practical steps to ....
Release Date 2022/03 -
The Tao of Network Security Monitoring Beyond Intrusion Detection
Author Richard Bejtlich
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners ....
Release Date 2004/07 -
The Social Leader: Redefining Leadership for the Complex Social Age
Author Sudhanshu Palsule , Frank Guglielmo
Technology, global economics, and demographics are colluding to create workspaces that thrive on communities rather than hierarchies. Our industrial paradigm with its roots in the military is swiftly being replaced by a paradigm based on networks that are held toget....
Release Date 2014/09 -
Author Zaid Hassan
Current responses to our most pressing societal challenges—from poverty to ethnic conflict to climate change—are not working. These problems are incredibly dynamic and complex, involving an ever-shifting array of factors, actors, and circumstances. They demand a hig....
Release Date 2014/02 -
The Snowball Effect: Communication Techniques to Make You Unstoppable
Author Andy Bounds
The long-awaited follow-up to the international bestseller The Jelly EffectCommunication is supposed to cause something. That's the point of it. So, what do you want to achieve following your communication? Do you want someone to answer 'yes'? Do you want to impr....
Release Date 2013/03 -
Author Lisa Chen , Lisa Witter
Women are a huge, uniquely receptive but still underutilized audience for a whole range of social and political causes, not just “women's issues.” In The She Spot, Lisa Witter and Lisa Chen, top executives in the nation's largest public interest communication....
Release Date 2008/06 -
Author Perry Carpenter , Kai Roer
Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture.The topic of security culture is mysterious and confusing to most leaders. But it doesn’t have to be. In The Security Culture Play....
Release Date 2022/04 -
Author Observer Foundation Observer Research Foundation
The Second Bush Presidency: Global Perspectives contains nine national perspectives on what a second Bush term portends for the world. Taken on one yardstick, five of the countries chosen (including the US) are members of the Security Council; using another, four ar....
Release Date 2006/10 -
The Scientification of Religion
Author Kocku von Stuckrad
The enigmatic relation between religion and science still presents a challenge to European societies and to ideas about what it means to be ‘modern.’ This book argues that European secularism, rather than pushing back religious truth claims, in fact has been religi....
Release Date 2014/05