-
-
Scene of the Cybercrime, 2nd Edition
Author Michael Cross , Debra Littlejohn Shinder
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the firs....
Release Date 2008/07 -
Scenario-Focused Engineering: A toolbox for innovation and customer-centricity
Author Drew Fletcher , Austina De Bonte
Blend the art of innovation with the rigor of engineeringGreat technology alone is rarely sufficient to ensure a product’s success. Scenario-Focused Engineering is a customer-centric, iterative approach used to design and deliver the seamless experiences and emotion....
Release Date 2014/12 -
Scanning Negatives and Slides, 2nd Edition
Author Sascha Steinhoff
Many photographers have either moved into digital photography exclusively or use both analog and digital media in their work. In either case, there is sure to be an archive of slides and negatives that cannot be directly integrated into the new digital workflow, nor....
Release Date 2009/02 -
Sarbanes-Oxley Ongoing Compliance Guide: Key Processes and Summary Checklists
Author Anne M. Marchetti
Quick and easy implementation and maintenance guide for ongoing Sarbanes-Oxley compliance For most companies, achieving compliance to the Sarbanes-Oxley Act (SOX) has proven to be more challenging, and more costly, than initially anticipated. In many cases, initial ....
Release Date 2007/03 -
Author Omar Santos , John Stuppi
CCNA Security 210-260 Official Cert GuideCCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Cisco Security exp....
Release Date 2015/09 -
Author Elaine Marmel
Let Sage Timeslips For Dummies show you how to turn your time into moneyIf you run a business that bills for its time, it's time you looked into Sage Timeslips and all it can do for you. This practical and friendly guide will help you get to know the Timeslips inte....
Release Date 2014/03 -
Sage Instant Accounts For Dummies
Author Jane E. Kelly
Get to grips with Sage Instant Accounts in simple steps.This comprehensive guide walks you through every aspect of setting up and using Sage Instant Accounts, from downloading and installing the software to customizing it to your needs. Packed with handy step-by-ste....
Release Date 2014/06 -
Author Karen Fredricks
Over 90 advanced recipes in this book and eBook for power users of Sage ACT! 2012 to increase the efficiency of businessesImmediately access ACT! 2012 with a full understanding of the Welcome screen and Navigation BarSegment your ACT! database into Groups and Compan....
Release Date 2011/09 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
Sage 50 Accounts For Dummies, 3rd UK Edition
Author Jane E. Kelly
The easy way to come to grips with Sage 50 AccountsWritten by a Sage 50 Accounts expert and packed with step-by-step instructions, this hands-on, accessible guide is the easiest way to master this popular small business accounting software. Walking you through every....
Release Date 2015/06 -
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT
Author Robert E. Kress
Uncover the secrets of an award-winning IT function and apply them to your business!Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten year....
Release Date 2011/10 -
Routledge Handbook of Constitutional Law
Author Cheryl Saunders , Thomas Fleiner , Mark Tushnet
The Routledge Handbook of Constitutional Law is an advanced level reference work which surveys the current state of constitutional law. Featuring new, specially commissioned papers by a range of leading scholars from around the world, it offers a comprehensive overv....
Release Date 2013/06 -
Router Security Strategies: Securing IP Network Traffic Planes
Author David J. Smith - CCIE No. 1986 , Gregg Schudel - CCIE No. 9591
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced tech....
Release Date 2007/12 -
Author Peter Senge , Don Frick
Meet the man whose work influenced some of the world's most prominent business leaders and spawned a worldwide movement that is still gaining strength today. Robert Greenleaf's landmark 1970 essay, The Servant as Leader, introduced the now common term “servan....
Release Date 2004/06 -
Risk Management and ISO 31000 - A pocket guide
Author Alan Field
This pocket guide introduces the premise of RBT (risk-based thinking), exploring the principles outlined in the risk management standard, ISO 31000:2018. Understand the benefits of risk-based thinking and ISO 31000 with this pocket guide!
Release Date 2023/03 -
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis
Author Marco M. Morana , Tony UcedaVelez
This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security counte....
Release Date 2015/05 -
Risk Assessment for Asset Owners
Author Steve Watkins , Alan Calder
Understand ISO 38500: the standard for the corporate governance of ITISO/IEC38500 is the international standard for the corporate governance of information and communication technology. The purpose of the standard is to create a framework to ensure that the Board is....
Release Date 2007/05 -
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Author Gregory Carpenter , Sean Bodmer , Jade Jones , Jeff Jones , Dr. Max Kilger
A complete guide to understanding and fighting advanced persistent threats—today's most destructive risk to enterprise securityReverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize the....
Release Date 2012/07 -
Author Khosro S. Jahdi , Tom Cockburn
Evolving stories of governance and change are being written into the emerging custom and practice of all kinds of organizations today, whether they are global or domestic, startup or blue chip, corporate or government agency. Changing ways of ‘doing business’ are no....
Release Date 2015/01 -
Reflexive Governance for Research and Innovative Knowledge
Author Marc Maesschalck
The governance theories that have developed over the past twenty years offer a new framework to consider and examine the collective conditions of a “Responsible Research and Innovation – RRI” linked up with the policy challenges of a society in transition in all ....
Release Date 2017/03 -
Reducing MTTD for High-Severity Incidents
Author Jordan Pritchard , Ramin Keene , Rodney Lester , Jay Holler , Michael Kehoe , Tammy B
For companies such as Amazon, Dropbox, and Gremlin, the term high severity incident (SEV) signifies drops in network availability, product feature issues, data loss, revenue loss, and security risks. These high-impact bugs occur when coding, automation, testing, an....
Release Date 2018/12 -
Rebuilding Trust in the Workplace
Author Michelle L. Reina , Dennis S. Reina
If so, you may be experiencing the confidence-busting, commitment-breaking, energy-draining patterns consistent with broken trust. We've all been there, but few of us know how to rebuild that trust. Dennis and Michelle Reina have spent their careers researchin....
Release Date 2010/09 -
Author Peter Yaworski
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbu....
Release Date 2019/06 -
Author Stephen Bussey
Give users the real-time experience they expect, by using Elixir and Phoenix Channels to build applications that instantly react to changes and reflect the application's true state. Learn how Elixir and Phoenix make it easy and enjoyable to create real-time applications ....
Release Date 2020/03 -
Read Me First!: A Style Guide for the Computer Industry, Second Edition
Author Sun Technical Publications
The must-have reference for every technical writer, editor, and documentation manager—now fully updated!Read Me First! is the definitive guide to creating technical documentation that is clear, consistent, and easy to understand. Sun Microsystems' award-winning tec....
Release Date 2003/05 -
Author Gyles Lingwood , Roger Horberry
If you've ever struggled to craft a powerful message that really hits the spot, you'll know it's harder than it looks. Wouldn't it be helpful to have an expert on hand to explain how the professionals really do it? Better still, how about a whole range of writer....
Release Date 2014/09 -
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will.... -
Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
Author Nihad A. Hassan
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, re....
Release Date 2019/11