-
Learn Computer Forensics - Second Edition
Author William Oettinger
Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collectedKey FeaturesInvestigate the core methods of computer forensics to procure and secure advanced digital evidence skillfullyRecord the digital evidence collected and....
Release Date 2022/07 -
Author Karen Fredricks
Over 90 advanced recipes in this book and eBook for power users of Sage ACT! 2012 to increase the efficiency of businessesImmediately access ACT! 2012 with a full understanding of the Welcome screen and Navigation BarSegment your ACT! database into Groups and Compan....
Release Date 2011/09 -
Author Mark Redmond
Social decentering theory was developed in response to the confusion created by the use of the term empathy and to a lesser extent, perspective-taking, to reflect a wide and varied set of human cognitive processes and behaviors. Theory of Social Decentering: A Theo....
Release Date 2018/05 -
Effective Incident Response Team, The
Author Brian Moeller , Julie Lucas
When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing com....
Release Date 2003/09 -
Selecting the Right NAP Architecture
Author Microsoft , Inc.
The objective of this guide is to provide a consistent structure for addressing the decisions and activities most critical to the successful implementation of the Microsoft® Network Access Protection (NAP) infrastructure. This guide includes several specific questio....
Release Date 2008/05 -
CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide
Author Dawn Dunkerley , Bob E. Rogers
An all-new exam guide for the industry-standard information technology risk certification, Certified in Risk and Information Systems Control (CRISC)Prepare for the newly-updated Certified in Risk and Information Systems Control (CRISC) certification exam with this ....
Release Date 2015/12 -
Handbook of System Safety and Security
Author Edward Griffor
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption o....
Release Date 2016/10 -
Author Zhaoyu Pian , Xiangping Meng
Intelligent Coordinated Control of Complex Uncertain Systems for Power Distribution and Network Reliability discusses the important topics revolving around the control of complex uncertain systems using the intelligent coordination control mechanism, a topic ....
Release Date 2015/11 -
Assemble the Social Web with zembly
Author Chris Webster , Todd Fast , Paul Anderson , Gail Anderson
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More! With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and....
Release Date 2008/12 -
Author Lloyd Kaufman
This is the 3rd volume in Mr. Kaufman's hilarious, how-to series for hard-working self-starters and hard-laughing, cheeky filmmakers. "Sell Your Own Damn Movie!" covers everything you need to do to get your finished film seen by festival-goers, movie-goers, DVD-buy....
Release Date 2012/09 -
Wiley CPAexcel Exam Review 2015 Study Guide (January): Business Environment and Concepts
Author O. Ray Whittington
The world's most effective CPA exam prep system - Business and Environmental Concepts moduleWiley CPAexcel Exam Review is the world's most trusted study guide for the Certified Public Accountant's exam - complete, comprehensive, and updated to align with the late....
Release Date 2014/12 -
What's Wrong with Damn Near Everything!
Author Larry Winget
The Pitbull of Personal Development® Takes on Damn Near Everything!Larry Winget does not mince words, and in this latest addition to his straight-talking brand, one of the most iconic leaders of the personal development industry puts down in black and white, What'....
Release Date 2017/07 -
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)), 6th Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This fully updated study guide covers every topic on the current version of the CompTIA Security+ examTake the .... -
Official (ISC)2® Guide to the ISSMP® CBK®
Author Joseph Steinberg , Harold F. Tipton
As the recognized leader in the field of information security education and certification, the (ISC)2® promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Securi....
Release Date 2011/04 -
The IT Regulatory and Standards Compliance Handbook
Author Craig S. Wright
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and t....
Release Date 2008/07 -
Malware Forensics Field Guide for Windows Systems
Author James M. Aquilina , Eoghan Casey , Cameron H. Malin
Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital ....
Release Date 2012/05 -
International Auditing Standards in the United States
Author Gary Kleinman Kleinman , Asokan Anandarajan
International auditing of publicly owned corporations is governed largely by either U.S. Public Company Accounting Oversight Board (PCAOB) auditing standards or International Standards on Auditing (ISA) established by the International Federation of Acco....
Release Date 2014/12 -
Author Nipun Jaswal
With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.In DetailThe Metasploit framework has been around f....
Release Date 2014/05 -
Disaster Planning for Libraries
Author Guy Robertson
Libraries are constantly at risk. Every day, many libraries and their collections are damaged by fire, flooding, high winds, power outages, and criminal behaviour. Every library needs a plan to protect its staff, sites and collections, including yours. Disaste....
Release Date 2014/12 -
Mobile Security: A Pocket Guide
Author Steven Furnell
A concise and practical guide to mobile securityThis pocket guide gives you clear and reliable guidance on how to protect the information contained in your mobile phone.Written by one of the country's top academic experts on information security, the guide covers s....
Release Date 2009/07 -
Once More Unto the Breach: Managing information security in an uncertain world
Author Andrea C Simmons
The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is t....
Release Date 2015/02 -
Accountability: Angst, Awareness, Action
Author Jay P. Desai
This book was written to increase the public understanding of 'accountability'. The author constructs a three-dimensional lens with which he examines the mechanisms that hold our governance institutions accountable. Desai explains why a burst of governance reforms....
Release Date 2012/02 -
Data Protection and Information Lifecycle Management
Author Tom Petrocelli
The Definitive Guide to Protecting Enterprise DataYour enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and prote....
Release Date 2005/09 -
Author David LeBlanc , Kevin Lam , Ben Smith
Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques—straight from members of the Microsoft Security Team.
Release Date 2004/07 -
CISSP Certification All-in-One Exam Guide, Fourth Edition, 4th Edition
Author Shon Harris
All-in-One is All You NeedFully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this....
Release Date 2007/11 -
Hacking Exposed 7: Network Security Secrets & Solutions
Author George Kurtz , Joel Scambray , Stuart McClure
A fully updated edition of the world’s bestselling computer security bookHacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persisten....
Release Date 2012/08 -
Complete Audio Mastering: Practical Techniques
Author Gebre E. Waddell
Learn the art of professional audio mastering"Gebre Waddell covers this all-important subject in greater depth than has ever been done in a book." -- Dave Collins, mastering engineer for The Nightmare Before Christmas, Jurassic Park, Soundgarden, War, Ben Harper, an....
Release Date 2013/07 -
Author Raymond Choo , Ben Martini , Darren Quick
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation i....
Release Date 2013/11 -
Security Program and Policies: Principles and Practices, Second Edition
Author Sari Greene
Everything you need to know about information security programs and policies, in one bookClearly explains all facets of InfoSec program and policy planning, development, deployment, and managementThoroughly updated for today’s challenges, laws, regulations, and best....
Release Date 2014/03 -
Continuity Supervisor, 4th Edition
Author Avril Rowlands
The Continuity Supervisor is a practical guide to the basics of continuity, designed to be of use both to the newcomer and those more experienced. Formerly titled 'The Continuity Handbook: a guide for single-camera shooting, this new edition covers the latest....
Release Date 2012/07