-
Control of Non-conventional Synchronous Motors
Author Jean-Paul Louis
Classical synchronous motors are the most effective device to drive industrial production systems and robots with precision and rapidity. However, numerous applications require efficient controls in non-conventional situations. Firstly, this is the case with synchr....
Release Date 2012/01 -
Penetration Testing: Protecting Networks and Systems
Author Kevin M. Henry
Preparation for the Certified Penetration Testing Engineer (CPTE) examination Penetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack. The Certifie....
Release Date 2012/06 -
Incident Response & Computer Forensics, 2nd Ed.
Author Chris Prosise , Kevin Mandia
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book s....
Release Date 2003/07 -
Identity and Access Management
Author Ertem Osmanoglu
Identity and Access Management: Business Performance Through Connected Intelligenceprovides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide i....
Release Date 2013/11 -
VCP-Cloud Official Cert Guide (with DVD): VMware Certified Professional - Cloud
Author Tom Ralph , Nathan Raper
The Publisher regrets that the CD/DVD content for this title cannot be made available Online.VCP-Cloud Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" qui....
Release Date 2013/10 -
Get Clients Now! (TM), 3rd Edition
Author Jay Conrad Levinson , C.J. Hayden
Get Clients Now! has helped thousands of independent professionals dramatically increase their client base. With this uniquely practical guide, it’s easy to replace scattershot marketing and networking efforts with proven and targeted tactics. Using a sim....
Release Date 2013/05 -
The Manager's Pocket Guide to Diversity Management
Author Dr. Edward E. Hubbard
This pocket guide will teach you the skills required to effectively manage a diverse workplace—not because it's the "right thing to do" or your organization requires it, but because it is good for business. Gain diversity awareness, tools, knowledge and techniques ....
Release Date 2004/01 -
Author Amr Sukkar
This book tries to support the elaboration and implementation of strategies and to foster SMEs and entrepreneurship development.Most of businesses fall within the category of start-up, small and medium size enterprises. Therefore, governments in part of their quest to reform the economy and related ....
Release Date 2022/08 -
Service Desk and Incident Manager: Careers in IT service management
Author Peter Wheatcroft
The role of a service desk manager is to provide the single point of contact between an IT organisation and its users. Responsibilities include developing, implementing, monitoring and improving processes and procedures relating to the management of incidents and se....
Release Date 2014/07 -
Governance for Sustainable Development
Author Rosalie Callway
As the process of globalization continues and power imbalances between decision-making institutions become increasingly apparent, the need for a critical assessment of the way in which we manage our interaction with the natural environment becomes ever more urg....
Release Date 2013/06 -
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT
Author Robert E. Kress
Uncover the secrets of an award-winning IT function and apply them to your business!Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten year....
Release Date 2011/10 -
Corrosion Control for Offshore Structures
Author Ramesh Singh
A variable game changer for those companies operating in hostile, corrosive marine environments, Corrosion Control for Offshore Structures provides critical corrosion control tips and techniques that will prolong structural life while saving millions in cost. In thi....
Release Date 2014/08 -
Simple Steps to Data Encryption
Author Peter Loshin
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to b....
Release Date 2013/04 -
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Author Wil Allsopp
The first guide to planning and performing a physical penetration test on your computer's securityMost IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT ....
Release Date 2009/09 -
Cyber Security and Digital Forensics
Author Mangesh M. Ghonge , Sabyasachi Pramanik , Ramchandra Mangrulkar , Dac-Nhuong Le
CYBER SECURITY AND DIGITAL FORENSICSCyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.Cur....
Release Date 2022/03 -
The Appropriations Law Answer Book
Author William G. Arnold
Avoid Violations of the Antideficiency Act!Antideficiency Act (ADA) violations within both the financial and audit communities are now at an all-time high. Violations often result from a lack of knowledge about what is and what is not permissible under the law....
Release Date 2012/02 -
Author Mike Shema
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious att....
Release Date 2012/10 -
The Manager's Pocket Guide to Mega Thinking and Planning
Author Roger Kaufman
Our world is changing and changeable. Do you know where your organization is headed? Can you justify why you should go there? And provide the criteria for judging your progress and success? This pocket guide helps you through the process of creating a better future ....
Release Date 2011/01 -
Author Frank Rubin
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: ....
Release Date 2022/08 -
Metasploit Penetration Testing Cookbook - Second Edition
Author Abhinav Singh , Monika Agarwal
Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it’s ideal for Metaspoilt veterans and newcomers alike.Special focus on the latest operating ....
Release Date 2013/10 -
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Author Trevor Stuart , Joe Anich
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 DefenderKey FeaturesDetect, protect, investigate, and remediate threats using Microsoft Defender for endpointExpl....
Release Date 2022/03 -
Author LID Editorial
Who you know has always been as important as what you know, and social or business networks (that is, groups of people connecting together with a common interest) have existed since time began. Your connections can help with everything from business deals or career ....
Release Date 2014/06 -
Digital Sub-Editing and Design
Author Stephen Quinn
This excellent book covers editing in the digital age, demonstrating the tools needed for effective text editing. Learn how to write powerful headlines and captions, and how to edit body text quickly and cleanly. It also concentrates on design in the digital e....
Release Date 2012/11 -
Introduction to Digital Audio, 2nd Edition
Author John Watkinson
Master the basics from first principles: the physics of sound, principles of hearing etc, then progress onward to fundamental digital principles, conversion, compression and coding and then onto transmission, digital audio workstations, DAT and optical disks. ....
Release Date 2013/07 -
Digital Filmmaking, 2nd Edition
Author Natalie Phillips , Thomas Ohanian
Digital Filmmaking has been called the bible for professional filmmakers in the digital age. It details all of the procedural, creative, and technical aspects of pre-production, production, and post-production within a digital filmmaking environment. It exami....
Release Date 2013/04 -
Digital Storytelling, 2nd Edition
Author Carolyn Handler Miller
Equally useful for seasoned professionals and those new to the field, Carolyn Handler Miller covers effective techniques for creating compelling narratives for a wide variety of digital media. Written in a clear, non-technical style, it offers insights into the proc....
Release Date 2008/04 -
Sustainable Development and Governance in Europe
Author Thomas C. Hoerber , Pamela M. Barnes
This book analyses the evolution of the sustainability discourse in the European Union, exploring the conditions necessary for sustainable development to move from a conceptual model into a model for action for strategic decision makers at all levels of governance. ....
Release Date 2013/06 -
Digital Logic Testing and Simulation, 2nd Edition
Author Alexander Miczo
Your road map for meeting today's digital testing challengesToday, digital logic devices are common in products that impact public safety, including applications in transportation and human implants. Accurate testing has become more critical to reliability, safety,....
Release Date 2003/07 -
Fuzzy Control and Identification
Author John H. Lilly
This book gives an introduction to basic fuzzy logic and Mamdani and Takagi-Sugeno fuzzy systems. The text shows how these can be used to control complex nonlinear engineering systems, while also also suggesting several approaches to modeling of complex engineering ....
Release Date 2010/12 -
Author Stephen Trachtenberg , Susan R. Pierce
Revamp senior administration organization for more effective governanceGovernance Reconsidered: How Boards, Presidents, Administrators, and Faculty Can Help Their Colleges Thrive takes an in-depth look at the current practice of governance in higher education and ex....
Release Date 2014/05