-
Assemble the Social Web with zembly
Author Chris Webster , Todd Fast , Paul Anderson , Gail Anderson
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More! With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and....
Release Date 2008/12 -
The PayPal Official Insider Guide to Internet Security: Spot scams and protect your online business
Author Michelle Savage
Technology moves fast. So do criminals. Cyber attacks hit large and small merchants alike, phishers and fraudsters seem to be everywhere, and identity theft is prevalent. But this is not the end of the world, and you can’t afford to hide in the closet. Your customer....
Release Date 2012/10 -
Scenario-Focused Engineering: A toolbox for innovation and customer-centricity
Author Drew Fletcher , Austina De Bonte
Blend the art of innovation with the rigor of engineeringGreat technology alone is rarely sufficient to ensure a product’s success. Scenario-Focused Engineering is a customer-centric, iterative approach used to design and deliver the seamless experiences and emotion....
Release Date 2014/12 -
The Effect of Temperature and other Factors on Plastics and Elastomers, 3rd Edition
Author Laurence W. McKeen
This reference guide brings together a wide range of critical data on the effect of temperature on plastics and elastomers, enabling engineers to make optimal material choices and design decisions. The effects of humidity level and strain rate on mechanical and elec....
Release Date 2014/04 -
Network Access Control For Dummies®
Author Denzil Wessels , Rich Campagna , Jay Kelley
Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, a....
Release Date 2009/05 -
Author Agnieszka Klus , John Bambenek
grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it....
Release Date 2009/01 -
Author Sunil Wadhwa , Joe Kelly , Ken Draper , David Delcourt , Vik Davar , Stefan Brunner
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutio....
Release Date 2008/02 -
Author P. Carlo Cacciabue , Erik Hollnagel , Pietro C. Cacciabue , Jean-Michel Hoc
Technological development has changed the nature of industrial production so that it is no longer a question of humans working with a machine, but rather that a joint human machine system is performing the task. This development, which started in the 1940s, ha....
Release Date 2013/06 -
Author Michelle Tillis LEDERMAN
We all know that networking is important, and that forming relationships with others is a vital part of success. But sometimes it seems like networking removes all emotions from the equation and focuses only on immediate goals…whereas the kind of relation....
Release Date 2011/09 -
Social Movements for Good: How Companies and Causes Create Viral Change
Author Derrick Feldmann
Create real change in the new social movement paradigmSocial Movements for Good is a guidebook for driving change, by taking advantage of the social "currency" that makes movements go viral. Author Derrick Feldmann has spent a career showing organizations how to be....
Release Date 2016/02 -
Computers For Seniors For Dummies, 6th Edition
Author Faithe Wempen
A simple guide to computers that'll show you what all the fuss is aboutMost people new to computers find them a little intimidating at first. But with the right guidance, even a total novice can be sending email and banking online in no time at all. Computers For Seniors For Dummies is your must-ha....
Release Date 2021/12 -
Author David D. Busch
DAVID BUSCH'S NIKON D3200 GUIDE TO DIGITAL SLR PHOTOGRAPHY is your onestop resource and reference for the Nikon D3200, the latest entrylevel DSLR in the Nikon product line, featuring a 16.2 megapixel sensor, full HDTV video, and ISO up to 12,800. With this book in ....
Release Date 2012/07 -
Author Eric J Gruber
Like to build websites in the wild with your MacBook? This concise hands-on guide introduces you to the ideal editor: Coda 2. Rather than clutter your screen with shell access, a separate CSS editor, and a version control app, you’ll discover how Coda’s "one-window ....
Release Date 2013/01 -
Air and Missile Defense Systems Engineering
Author John B. Hoffman , Warren J. Boord
Air and Missile Defense Systems Engineering fills a need for those seeking insight into the design procedures of the air and missile defense system engineering process. Specifically aimed at policy planners, engineers, researchers, and consultants, it presents a ba....
Release Date 2016/04 -
Key Case Law Rules for Government Contract Formation
Author Patrick Butler
Go Beyond the FAR!The guidance contained in the almost 2000 pages of the Federal Acquisition Regulation and the various agency supplements are just a part of the resources government acquisition professionals need to do their jobs effectively. Accessing and un....
Release Date 2014/09 -
Author Ido Dubrawsky
Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; appl....
Release Date 2009/10 -
Business Continuity Management Systems - Implementation and certification to ISO 22301
Author Hilary Estall
This practical guide is written for organisations who are implementing a business continuity management system and certification in line with ISO 22301. It will prove invaluable for those new to business continuity management or to management systems. Enriched with....
Release Date 2012/09 -
Bring Your Own Device - The mobile computing challenge
Author BCS , The Chartered Institute for IT
The increasing use of personal devices such as smartphones and tablets in the workplace at work is offering an opportunity as well as a challenge for organisations, in particular the IT department. This ebook looks at ways to embrace the benefits of BYOD while offer....
Release Date 2013/05 -
Building a Pentesting Lab for Wireless Networks
Author Andrey Popov , Vyacheslav Fadyushin
Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniquesAbout This BookDesign and build an extendable penetration testing lab with wireless access suitable for home and enterprise useFill the lab with various compo....
Release Date 2016/03 -
Author Ashok Mohanty , Jibitesh Mishra
Software Engineering covers both function oriented as well as object oriented (OO) approach and emphasises on emerging areas such as 'web engineering', 'software maintenance' and 'component based software engineering'. This book further includes case studies o....
Release Date 2011/07 -
The Business Case For Network Security: Advocacy, Governance, And Roi
Author Warren Saxe , Catherine Paquet
Understand the total cost of ownership and return on investment for network security solutionsUnderstand what motivates hackers and how to classify threatsLearn how to recognize common vulnerabilities and common types of attacksExamine modern day security systems, d....
Release Date 2004/12 -
Author Himanshu Dwivedi , Chris Clark , David Thiel
Secure today's mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how ....
Release Date 2010/02 -
Hacking Exposed Mobile Security Secrets & Solutions
Author Mike Price , John Steven , Scott Matsumoto , Swapnil Deshmukh , Sarath Geethakumar
Proven security tactics for today’s mobile apps,devices, and networks A great overview of the new threats created by mobile devices.The authors have heaps of experience in the topics and bring that to every chapter. Pro....
Release Date 2013/07 -
Author Andrew Bindner , James Broad
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you thr....
Release Date 2013/12 -
How to Become an International Disaster Volunteer
Author Michael Noone
How to Become an International Disaster Volunteer discusses the immense value an experienced water systems engineer, trauma surgeon, or communications specialist could bring to a disaster stricken community, while also explaining how their professional educations d....
Release Date 2017/02 -
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work
Author Anthony David Giordano
Make Information GovernanceWork: Best Practices, Step-by-Step Tasks, and Detailed DeliverablesMost enterprises recognize the crucial importance of effective information governance. However, few are satisfied with the value of their efforts to date. Information gover....
Release Date 2014/09 -
Network Basics Companion Guide, Video Enhanced Edition
Author Cisco Networking Academy
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.Using a top-down OSI model approach, the course introduces the architecture, structure, functi....
Release Date 2013/12 -
Author Neal Allen
Network Maintenance and Troubleshooting GuideField-Tested Solutions for Everyday Problems, Second EditionNeal AllenThe 100% practical, real-world guide to anticipating, finding, and solving network problems—fast!Real-life networks don’t always behave “by the book.” ....
Release Date 2009/10 -
Author Chris P. Underwood
This important new book bridges the gap between works on classical control and process control, and those dealing with HVAC control at a more elementary level, which generally adopt a qualitative and descriptive control. Both advanced level students and specialist p....
Release Date 2002/09 -
CompTIA Security+™ Deluxe: Study Guide
Author Emmett Dulaney
CompTIA Security+ Deluxe Study Guide gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and insights drawn from real-world experience and review your newly acquire....
Release Date 2008/11