-
Supervision and Safety of Complex Systems
Author Jean Arlat , Yves Vandenboomgaerde , Nada Matta
This book presents results of projects carried out by both scientific and industry researchers into the techniques to help in maintenance, control, supervision and security of systems, taking into account the technical environmental and human factors.This work is su....
Release Date 2012/10 -
Integrating Program Management and Systems Engineering
Author Eric Rebentisch
Integrate critical roles to improve overall performance in complex engineering projectsIntegrating Program Management and Systems Engineering shows how organizations can become more effective, more efficient, and more responsive, and enjoy better performance outcom....
Release Date 2017/02 -
Alice and Bob Learn Application Security
Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development.... -
Digital Forensics and Internet of Things
Author Anita Gehlot , Rajesh Singh , Jaskaran Singh , Neeta Raj Sharma
DIGITAL FORENSICS AND INTERNET OF THINGSIt pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal.The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to a....
Release Date 2022/04 -
Cyber Security and Network Security
Author Sabyasachi Pramanik , Debabrata Samanta , M. Vinay , Abhijit Guha
CYBER SECUTIRY AND NETWORK SECURITYWritten and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly....
Release Date 2022/04 -
Cyber Mayday and the Day After
Author Daniel Lohrmann , Shamane Tan
Successfully lead your company through the worst crises with this first-hand look at emergency leadershipCyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event....
Release Date 2021/11 -
Author Brian O'Leary , Hugh McGuire
The rapid shakeup--from print to digital buying and reading--is a transitional phase, necessary in order to make the next jump, which is far bigger and more exciting: what happens when all books are truly digital, connected, ubiquitous. We're starting to have the i....
Release Date 2012/08 -
Feedback Control for Computer Systems
Author Philipp K. Janert
How can you take advantage of feedback control for enterprise programming? With this book, author Philipp K. Janert demonstrates how the same principles that govern cruise control in your car also apply to data center management and other enterprise systems. Through....
Release Date 2013/10 -
Federal IT Capital Planning and Investment Control (with CD)
Author Patricia A. Kelley , Thomas G. Kessler
Reduce risk and improve the overall performance of IT assets! Federal IT Capital Planning and Investment Control is the first book to provide a comprehensive look at the IT capital planning and investment control (CPIC) process. Written from a practitioner's ....
Release Date 2008/03 -
Applying Social Tools to Learning
Author Dave Wilkins
With social learning, the whole company is part of the learning and development team. This Infoline will show you how to strategically design effective and agile social learning strategies that address the unique needs of various learning initiatives. Learn about th....
Release Date 2012/04 -
Router Security Strategies: Securing IP Network Traffic Planes
Author David J. Smith - CCIE No. 1986 , Gregg Schudel - CCIE No. 9591
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced tech....
Release Date 2007/12 -
Author Cameron Buchanan
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali LinuxIn DetailAs attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools ar....
Release Date 2014/07 -
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
Author Vijay Kumar Velu
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers.About This BookEmploy advanced pentesting techniques with Kali Linux to build highly-secured systemsGet to grips with various stealth techn....
Release Date 2017/06 -
Certified Information Security Manager Exam Prep Guide
Author Hemang Doshi
Pass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey FeaturesPass the CISM exam confidently with this step-by-step guideExplore practical solutions that validate your knowledge and expertise in managing enterprise information s....
Release Date 2021/11 -
OPNsense Beginner to Professional
Author Julio Cesar Bueno de Camargo
Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey FeaturesLearn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party plugins such as Nginx and SenseiGrasp hands-on exa....
Release Date 2022/06 -
The Ultimate Kali Linux Book - Second Edition
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchPurchase of the print or Kindle book includes a free eBook in the PDF formatKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using a....
Release Date 2022/02 -
MySpace Unraveled: A Parent’s Guide to Teen Social Networking from the Directors of BlogSafety.com
Author Anne Collier , Larry Magid
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience f....
Release Date 2006/08 -
Computer Forensics InfoSec Pro Guide
Author David Cowen
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Infor....
Release Date 2013/03 -
Author Josh Pauli
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system....
Release Date 2013/06 -
Protecting Your Company's Intellectual Property
Author Deborah E. Bouchoux
A company’s most valuable assets may not be physical. This book shows how to protect them without fences or security guards! You can’t touch it or feel it. Sometimes you can’t even see it. Yet, intellectual property continues to soar in value, comprising an increas....
Release Date 2006/02 -
Author Joy R. Butler
If you actively use the internet to advance your business and professional endeavors, you are a cyber citizen and this book is for you. As a good cyber citizen, you want to stay legal online and protect your online interests. The Cyber Citizen’s Guide Th....
Release Date 2010/05 -
Unmanned Aerial Vehicles: Embedded Control
Author Rogelio Lozano
This book presents the basic tools required to obtain the dynamical models for aerial vehicles (in the Newtonian or Lagrangian approach). Several control laws are presented for mini-helicopters, quadrotors, mini-blimps, flapping-wing aerial vehicles, planes, etc. Fi....
Release Date 2010/03 -
The Antivirus Hacker's Handbook
Author Elias Bachaalany , Joxean Koret
Hack your antivirus software to stamp out future vulnerabilitiesThe Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future ....
Release Date 2015/09 -
Trust Building and Boundary Spanning in Cross-Border Management
Author Michael Zhang
This edited book addresses two critical issues in international management: building trust and managing boundary spanning activities between international business partners. The duel-process of internationalization of multinational corporations (MNCs), through globalisati....
Release Date 2018/03 -
Under Control: Governance Across the Enterprise
Author Jacob Lamm
Under Control captures decades of business governance experience from many of the leading authorities at CA, Inc. This book sets out not only to explain the essential challenges of effective business governance, but to help you build solutions for your organization ....
Release Date 2009/12 -
Information Security Governance Simplified
Author Todd Fitzgerald
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how....
Release Date 2016/04 -
Securing the Borderless Network: Security for the Web 2.0 World
Author Tom Gillis
Securing the Borderless Network: Security for the Web 2.0 WorldTom GillisSecuring the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applicationsToday’s new Web 2.0, virtualization, mobility, tele....
Release Date 2010/04 -
Check Point NGX R65 Security Administration
Author Ralph Bonnell
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and ....
Release Date 2011/08 -
Mastering Wireless Penetration Testing for Highly Secured Environments
Author Aaron Johns
Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionalsIn DetailPenetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By ....
Release Date 2015/01