-
Identity and Access Management
Author Ertem Osmanoglu
Identity and Access Management: Business Performance Through Connected Intelligenceprovides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide i....
Release Date 2013/11 -
Get Clients Now! (TM), 3rd Edition
Author Jay Conrad Levinson , C.J. Hayden
Get Clients Now! has helped thousands of independent professionals dramatically increase their client base. With this uniquely practical guide, it’s easy to replace scattershot marketing and networking efforts with proven and targeted tactics. Using a sim....
Release Date 2013/05 -
The Manager's Pocket Guide to Diversity Management
Author Dr. Edward E. Hubbard
This pocket guide will teach you the skills required to effectively manage a diverse workplace—not because it's the "right thing to do" or your organization requires it, but because it is good for business. Gain diversity awareness, tools, knowledge and techniques ....
Release Date 2004/01 -
Author Amr Sukkar
This book tries to support the elaboration and implementation of strategies and to foster SMEs and entrepreneurship development.Most of businesses fall within the category of start-up, small and medium size enterprises. Therefore, governments in part of their quest to reform the economy and related ....
Release Date 2022/08 -
Service Desk and Incident Manager: Careers in IT service management
Author Peter Wheatcroft
The role of a service desk manager is to provide the single point of contact between an IT organisation and its users. Responsibilities include developing, implementing, monitoring and improving processes and procedures relating to the management of incidents and se....
Release Date 2014/07 -
Kali Linux Wireless Penetration Testing : Beginner's Guide
Author Vivek Ramachandran , Cameron Buchanan
Master wireless testing techniques to survey and attack wireless networks with Kali LinuxIn DetailAs wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The K....
Release Date 2015/03 -
Author Svetlana Ostrovskaya , Oleg Skulkin
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey FeaturesExplore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware detection using volatile memoryGet acquainted wi....
Release Date 2022/03 -
Governance for Sustainable Development
Author Rosalie Callway
As the process of globalization continues and power imbalances between decision-making institutions become increasingly apparent, the need for a critical assessment of the way in which we manage our interaction with the natural environment becomes ever more urg....
Release Date 2013/06 -
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT
Author Robert E. Kress
Uncover the secrets of an award-winning IT function and apply them to your business!Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten year....
Release Date 2011/10 -
Corrosion Control for Offshore Structures
Author Ramesh Singh
A variable game changer for those companies operating in hostile, corrosive marine environments, Corrosion Control for Offshore Structures provides critical corrosion control tips and techniques that will prolong structural life while saving millions in cost. In thi....
Release Date 2014/08 -
Simple Steps to Data Encryption
Author Peter Loshin
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to b....
Release Date 2013/04 -
VCP-Cloud Official Cert Guide (with DVD): VMware Certified Professional - Cloud
Author Tom Ralph , Nathan Raper
The Publisher regrets that the CD/DVD content for this title cannot be made available Online.VCP-Cloud Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" qui....
Release Date 2013/10 -
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Author Wil Allsopp
The first guide to planning and performing a physical penetration test on your computer's securityMost IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT ....
Release Date 2009/09 -
Cyber Security and Digital Forensics
Author Mangesh M. Ghonge , Sabyasachi Pramanik , Ramchandra Mangrulkar , Dac-Nhuong Le
CYBER SECURITY AND DIGITAL FORENSICSCyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.Cur....
Release Date 2022/03 -
Author Mike Shema
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious att....
Release Date 2012/10 -
The Manager's Pocket Guide to Mega Thinking and Planning
Author Roger Kaufman
Our world is changing and changeable. Do you know where your organization is headed? Can you justify why you should go there? And provide the criteria for judging your progress and success? This pocket guide helps you through the process of creating a better future ....
Release Date 2011/01 -
Author Frank Rubin
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: ....
Release Date 2022/08 -
Metasploit Penetration Testing Cookbook - Second Edition
Author Abhinav Singh , Monika Agarwal
Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it’s ideal for Metaspoilt veterans and newcomers alike.Special focus on the latest operating ....
Release Date 2013/10 -
Author LID Editorial
Who you know has always been as important as what you know, and social or business networks (that is, groups of people connecting together with a common interest) have existed since time began. Your connections can help with everything from business deals or career ....
Release Date 2014/06 -
Incident Response & Computer Forensics, 2nd Ed.
Author Chris Prosise , Kevin Mandia
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book s....
Release Date 2003/07 -
Digital Sub-Editing and Design
Author Stephen Quinn
This excellent book covers editing in the digital age, demonstrating the tools needed for effective text editing. Learn how to write powerful headlines and captions, and how to edit body text quickly and cleanly. It also concentrates on design in the digital e....
Release Date 2012/11 -
Introduction to Digital Audio, 2nd Edition
Author John Watkinson
Master the basics from first principles: the physics of sound, principles of hearing etc, then progress onward to fundamental digital principles, conversion, compression and coding and then onto transmission, digital audio workstations, DAT and optical disks. ....
Release Date 2013/07 -
Digital Filmmaking, 2nd Edition
Author Natalie Phillips , Thomas Ohanian
Digital Filmmaking has been called the bible for professional filmmakers in the digital age. It details all of the procedural, creative, and technical aspects of pre-production, production, and post-production within a digital filmmaking environment. It exami....
Release Date 2013/04 -
Sustainable Development and Governance in Europe
Author Thomas C. Hoerber , Pamela M. Barnes
This book analyses the evolution of the sustainability discourse in the European Union, exploring the conditions necessary for sustainable development to move from a conceptual model into a model for action for strategic decision makers at all levels of governance. ....
Release Date 2013/06 -
Digital Logic Testing and Simulation, 2nd Edition
Author Alexander Miczo
Your road map for meeting today's digital testing challengesToday, digital logic devices are common in products that impact public safety, including applications in transportation and human implants. Accurate testing has become more critical to reliability, safety,....
Release Date 2003/07 -
Fuzzy Control and Identification
Author John H. Lilly
This book gives an introduction to basic fuzzy logic and Mamdani and Takagi-Sugeno fuzzy systems. The text shows how these can be used to control complex nonlinear engineering systems, while also also suggesting several approaches to modeling of complex engineering ....
Release Date 2010/12 -
Author Stephen Trachtenberg , Susan R. Pierce
Revamp senior administration organization for more effective governanceGovernance Reconsidered: How Boards, Presidents, Administrators, and Faculty Can Help Their Colleges Thrive takes an in-depth look at the current practice of governance in higher education and ex....
Release Date 2014/05 -
Wireless Security Architecture
Author Jennifer Minella , Stephen Orr
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutionsWireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrast....
Release Date 2022/04 -
Modeling and Control of Modern Electrical Energy Systems
Author Masoud Karimi-Ghartemani
Modeling and Control of Modern Electrical Energy SystemsA step-by-step approach to the modeling, analysis, and control of modern electronically controlled energy systemsIn Modeling and Control of Modern Electrical Energy Systems, distinguished researcher Dr. Masoud Karimi-Ghartemani delivers a compr....
Release Date 2022/08 -
Social Evolution and Inclusive Fitness Theory
Author James A.R. Marshall
Social behavior has long puzzled evolutionary biologists, since the classical theory of natural selection maintains that individuals should not sacrifice their own fitness to affect that of others. Social Evolution and Inclusive Fitness Theory argues that a theory ....
Release Date 2015/04