-
Author Morgan Jones
Valve Amplifiers has been recognized as the most comprehensive guide to valve amplifier design, analysis, modification and maintenance. It provides a detailed presentation of the rudiments of electronics and valve design for engineers and non-experts. The source als....
Release Date 2011/10 -
Validating Your Business Continuity Plan: Ensuring your BCP actually works
Author Robert Clark
75% of companies without a business continuity plan fail within three years. Disruptive incidents can affect any organization and occur at any moment. ICT outages, cyber attacks, natural disasters, terrorist attacks, pandemics, supply chain failures and other unex....
Release Date 2015/11 -
Author Becky Livingston
Web 2.0 is transforming workplace learning in many ways. This Infoline is designed to introduce you to the many Web 2.0 technologies available and give you ideas about how to implement them in your organization and will help you identify various social networking op....
Release Date 2010/01 -
Author W. Curtis Preston
Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quic....
Release Date 2002/02 -
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Author David Both
Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.This book....
Release Date 2019/12 -
Unsolved Problems in Mathematical Systems and Control Theory
Author Vincent D. Blondel , Alexandre Megretski
This book provides clear presentations of more than sixty important unsolved problems in mathematical systems and control theory. Each of the problems included here is proposed by a leading expert and set forth in an accessible manner. Covering a wide range of areas....
Release Date 2009/04 -
Unmasking the Social Engineer: The Human Element of Security
Author Paul Ekman , Paul Kelly F. , Christopher Hadnagy
Learn to identify the social engineer by non-verbal behaviorUnmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men ....
Release Date 2014/02 -
Unmanned Aerial Vehicles: Embedded Control
Author Rogelio Lozano
This book presents the basic tools required to obtain the dynamical models for aerial vehicles (in the Newtonian or Lagrangian approach). Several control laws are presented for mini-helicopters, quadrotors, mini-blimps, flapping-wing aerial vehicles, planes, etc. Fi....
Release Date 2010/03 -
Unified Communications Forensics
Author Joseph II Shaw , Nicholas Mr. Grant
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by l....
Release Date 2013/10 -
Author Jamie Pride
The real-world secrets to startup successUnicorn Tears is the smart entrepreneur’s guide to startups. A full 92% of startups fail in the first three years — but failure is not inevitable. Most of these companies self-sabotage, unconsciously eliminating any chance a....
Release Date 2018/01 -
Unequal Protection, 2nd Edition
Author Thom Hartmann
Unequal taxes, unequal accountability for crime, unequal influence, unequal control of the media, unequal access to natural resources—corporations have gained these privileges and more by exploiting their legal status as persons. How did something so illogical ....
Release Date 2010/06 -
Author Leslie S. Hiraoka
He covers the anti-trust case against Microsoft; the successes of eBay, Amazon, Yahoo, and Google; road-kills along the information highway such as the forgotten eToys; as well as the Enron implosion and other corporate scandals. After tracing this amazing story he....
Release Date 2017/03 -
Author Stanley Siegel , Chris Williams , Scott Donaldson
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and busine....
Release Date 2018/12 -
Understanding Government Contract Law, 2nd Edition
Author Terrence M. O'Connor
This updated classic offers clear and concise explanations of the basic legal concepts of government contract law for professionals at any stage of their career. Written in straightforward language for contracting officers, contract administrators, contractors,....
Release Date 2018/11 -
Understanding Government Contract Law
Author Terrance M. O'Connor
A “back-to-basics” guide to government contract lawFinally! A plain-English presentation of the basic legal concepts of government contract law for professionals at any stage in their careers.Until now, anyone in the procurement field has had to trudge through....
Release Date 2007/02 -
Author Ryan Leirvik
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are availabl....
Release Date 2022/01 -
Under Control: Governance Across the Enterprise
Author Jacob Lamm
Under Control captures decades of business governance experience from many of the leading authorities at CA, Inc. This book sets out not only to explain the essential challenges of effective business governance, but to help you build solutions for your organization ....
Release Date 2009/12 -
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Author Wil Allsopp
The first guide to planning and performing a physical penetration test on your computer's securityMost IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT ....
Release Date 2009/09 -
Turning Heads and Changing Minds - Transcending IT Auditor Archetypes
Author Chong Ee
Building a better rapport with your clients How IT auditors and their clients perceive each other affects the quality of their working relationships. Although most books for IT auditors acknowledge the importance of soft skills, they usually focus on technical abi....
Release Date 2013/03 -
Author Tsinghua University Tsinghua University Press , Dengguo Feng
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such ....
Release Date 2017/12 -
Trust Building and Boundary Spanning in Cross-Border Management
Author Michael Zhang
This edited book addresses two critical issues in international management: building trust and managing boundary spanning activities between international business partners. The duel-process of internationalization of multinational corporations (MNCs), through globalisati....
Release Date 2018/03 -
Trust and Betrayal in the Workplace
Author Michelle L. Reina , Dennis S. Reina
More than ever, there is a need for trust in the workplace. After all, business is conducted via relationships, and trust is the foundation to effective relationships. Yet, trust means different things to different people and this is a big part of the problem. Coll....
Release Date 2006/01 -
Author Chris Brogan , Julien Smith
The 10th Anniversary Edition of Trust Agents helps companies get back on track in their efforts to build reputation, attention, and trust In the years since authors Chris Brogan and Julien Smith first released their groundbreaking book Trust Agents, social media....
Release Date 2020/07 -
Tribe of Hackers Security Leaders
Author Marcus J. Carey , Jennifer Jin
Tribal Knowledge from the Best in Cybersecurity LeadershipThe Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential securit....
Release Date 2020/03 -
Author Jennifer Jin , Marcus J. Carey
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published asTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introd....
Release Date 2019/08 -
Author Cornelia Schweppe , Wolfgang Schröer , Adrienne Chambon
In the context of ever-increasing globalization, transnational systems of support have emerged in response to the needs of transnational families, labour forces, and the communities within which they are located. This volume will be the first to systematically addre....
Release Date 2013/06 -
Transitioning to Quantum-Safe Cryptography on IBM Z
Author Bill White , Didier Andre , Gregg Arquero , Ritu Bajaj , Joe Cronin , Anne Dames , Hen
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break cl....
Release Date 2023/04 -
Author Claudia St. John , SPHR , SHRM-SCP
Human resources and management consultants are frequently asked to help their clients address fundamental breakdowns within their organizations. More often than not, these breakdowns occur between conflicting functional areas, such as sales and customer service, sa....
Release Date 2015/08 -
Author Frank Wander
Practical, proven guidance for transforming the culture of any IT departmentAs more and more jobs are outsourced, and the economy continues to struggle, people are looking for an alternative to the greed-driven, selfish leadership that has resulted in corporations w....
Release Date 2013/02 -
Transformational Governance: How Boards Achieve Extraordinary Change
Author Katha Kissman , Beth Gazley
There has never been so much pressure on nonprofit boards of directors to achieve a level of accountability that meets public and stakeholder expectations. Member-serving association boards may be especially challenged by their more complex affiliate structures and....
Release Date 2015/07