-
Author Chris Minnick , Eva Holland
Learn to code the fun way with nine real projects for true beginnersAdventures in Coding is written specifically for young people who want to learn how to code, but don't know where to begin. No experience? No problem! This book starts from the very beginning to t....
Release Date 2016/03 -
Adversarial Tradecraft in Cybersecurity
Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition.Key FeaturesGain an advantage against live hackers in a competition or real computing environmentUnderstand .... -
Author Laura Bell , Jim Bird , Rich Smith , Michael Brunton-Spall
Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren’t up to speed in their understandin....
Release Date 2017/09 -
Agile Model-Based Systems Engineering Cookbook
Discover recipes for addressing the growing complexity of modern systems by applying agile methodologies and techniques in model-based systems engineering (MBSE)Key FeaturesLearn how Agile and MBSE can work iteratively and collaborate to overcome system complexityDevelop essential systems engineerin.... -
Air and Missile Defense Systems Engineering
Author John B. Hoffman , Warren J. Boord
Air and Missile Defense Systems Engineering fills a need for those seeking insight into the design procedures of the air and missile defense system engineering process. Specifically aimed at policy planners, engineers, researchers, and consultants, it presents a ba....
Release Date 2016/04 -
Airborne Electronic Hardware Design Assurance
Author Roy Vandermolen , Randall Fulton
Written by a Federal Aviation Administration (FAA) consultant designated engineering representative (DER) and an electronics hardware design engineer who together taught the DO-254 class at the Radio Technical Commission for Aeronautics, Inc. (RTCA) in Washington, D....
Release Date 2017/01 -
Alice and Bob Learn Application Security
Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development.... -
All-in-One CISA® Certified Information Systems Auditor: Exam Guide, Second Edition
Author Peter Gregory
"All-in-One is All You Need"The new edition of this trusted resource offers complete, up-to-date coverage of all the material included on the latest release of the Certified Information Systems Auditor exam. Written by an IT security and audit expert, CISA Certified....
Release Date 2011/08 -
An Introduction to Anti-Bribery Management Systems (BS 10500): Doing right things
Author Alan Field
When is a gift not a gift? When it’s a bribe. For many, corporate hospitality oils the wheels of commerce. But where do you draw the line? Bribes, incentives, and inducements are not just a matter of used banknotes stuffed in brown envelopes. Expenses, cor....
Release Date 2015/04 -
An Introduction to Hacking and Crimeware
Author Victoria Loewengart
Defend your business, protect your livelihood, safeguard your future.Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits ....
Release Date 2012/01 -
An Introduction to Information Security and ISO27001: A Pocket Guide
Author Steve G Watkins
This new pocket guide is intended to meet the needs of two groups: Individual readers who have turned to it as an introduction to a topic that they know little about; and organizations implementing, or considering implementing, some sort of information security mana....
Release Date 2008/10 -
Analytical Solutions for Two Ferromagnetic Nanoparticles Immersed in a Magnetic Field
Author Gehan Anthonys , Richard C. Dorf
The investigation of the behavior of ferromagnetic particles in an external magnetic field is important for use in a wide range of applications in magnetostatics problems, from biomedicine to engineering. To the best of the author's knowledge, the systematic analysis for....
Release Date 2018/02 -
Author Tim Strazzere , Jose Andre Morales , Manu Quintans , Shane Hartman , Ken Dunham
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach t....
Release Date 2014/10 -
Author Wallace Jackson
This book is a brief primer covering concepts central to digital imagery, digital audio and digital illustration using open source software packages such as GIMP, Audacity and Inkscape. These are used for this book because they are free for commercial use. The book....
Release Date 2015/10 -
Anomaly Detection for Monitoring
Author Baron Schwartz , Preetam Jinka
Monitoring, the practice of observing systems and determining if they're healthy, is hard--and getting harder. In a perfect world, your anomaly detection system would warn you about new behaviors and data patterns in time to fix problems before they happened, and ....
Release Date 2016/03 -
APM Best Practices: Realizing Application Performance Management
Author Michael J. Sydor
The objective of APM Best Practices is to establish reliable Application Performance Management practices—to demonstrate value, to do it quickly, and to adapt to the client circumstances. Balancing long-term goals with short-term deliverables, but without compromisi....
Release Date 2010/01 -
Application of Big Data for National Security
Author Babak Akhgar , Gregory B. Saathoff , Hamid R. Arabnia , Richard Hill , Andrew Stanif
Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combin....
Release Date 2015/02 -
Application Security in the ISO 27001:2013 Environment
Author Vinod Vasudevan
Web application security as part of an ISO 27001-compliant information security management system Web application vulnerabilities are a common point of intrusion for cyber criminals. As cybersecurity threats proliferate and attacks escalate, and as applications pl....
Release Date 2015/10 -
Application Security in the ISO27001 Environment
Author Anbalahan Siddharth , Pakala Sangit , Shetty Sachin , Ummer Firosh , Mangla Anoop , V
As conduits of critical business data, it's vital that your software packages are adequately secured. The de-facto standard on application security, this book is your step-by-step guide to securing your software applications within a best practice ISO/IEC 27001 and....
Release Date 2008/04 -
Author Steve Anson
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced atta....
Release Date 2020/01 -
Author Michael McLafferty , Warun Levesque , Arthur Salmon
Master the art of detecting and averting advanced network security attacks and techniquesAbout This BookDeep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and WiresharkBecome an expert in ....
Release Date 2017/04 -
Applied Network Security Monitoring
Author Jason Smith , Chris Sanders
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring i....
Release Date 2013/11 -
Author Michael Mulholland
Bridging theory and practice, this book contains over 200 practical exercises and their solutions, to develop the problem-solving abilities of process engineers. The problems were developed by the author during his many years of teaching at university a....
Release Date 2016/12 -
Applying Social Tools to Learning
Author Dave Wilkins
With social learning, the whole company is part of the learning and development team. This Infoline will show you how to strategically design effective and agile social learning strategies that address the unique needs of various learning initiatives. Learn about th....
Release Date 2012/04 -
Architecting Mobile Solutions for the Enterprise
Author Dino Esposito
Your guide to planning and executing a complete mobile web strategyRevisit your approach to the mobile web—and deliver effective solutions that reach customers and clients on a variety of mobile devices. In this practical guide, web development luminary Dino Esposit....
Release Date 2012/05 -
Assemble the Social Web with zembly
Author Chris Webster , Todd Fast , Paul Anderson , Gail Anderson
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More! With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and....
Release Date 2008/12 -
Author David LeBlanc , Kevin Lam , Ben Smith
Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques—straight from members of the Microsoft Security Team.
Release Date 2004/07 -
Author Brad Hibbert , Morey J. Haber
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, ev....
Release Date 2018/06 -
Auditing Information Systems, Second Edition
Author Jack J. Champlain
Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing compu....
Release Date 2003/02 -
Auditing IT Infrastructures for Compliance
Author Michael G. Solomon , Martin Weiss
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Information systems and IT infrastructures are no longer void from governance and compliance given recent U.S.-based compliancy laws that were consummated during the ear....
Release Date 2010/09