-
The Appropriations Law Answer Book
Author William G. Arnold
Avoid Violations of the Antideficiency Act!Antideficiency Act (ADA) violations within both the financial and audit communities are now at an all-time high. Violations often result from a lack of knowledge about what is and what is not permissible under the law....
Release Date 2012/02 -
Author Eric Seagren
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get thi....
Release Date 2011/04 -
Coding for Penetration Testers
Author Ryan Linn , Jason Andress
Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It also provides a....
Release Date 2011/11 -
Placing the Suspect Behind the Keyboard
Author Brett Shavers
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work ....
Release Date 2013/02 -
The Technological Entrepreneur’s Playbook
Author Ian Chaston
As exemplified by Apple and Google, maximizing the wealth of organizations involves what Joseph Schumpeter described as “creative destruction.” This occurs when scientific or technological breakthroughs lead to the launch of a radically new product or se....
Release Date 2017/05 -
Author Frank Rubin
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: ....
Release Date 2022/08 -
Security Architect: Careers in information security
Author Jon Collins
Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies. They ensure ....
Release Date 2014/09 -
Learning zANTI2 for Android Pentesting
Author Miroslav Vitula
Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2About This BookUnderstand the basics of wireless penetration testing and its importanceLearn the techniques to perform penetration te....
Release Date 2015/08 -
Mahara ePortfolios Beginner's Guide
Author Derrin Kent , Thomas Bell , Richard Hand
Create your own e-Portfolio and Communities of Interest within an Educational or Professional Organization with this book and ebook.A step-by-step approach that takes you through examples with ample screenshots and clear explanationsCreate, customize, and maintain....
Release Date 2012/07 -
Introduction to Digital Audio, 2nd Edition
Author John Watkinson
Master the basics from first principles: the physics of sound, principles of hearing etc, then progress onward to fundamental digital principles, conversion, compression and coding and then onto transmission, digital audio workstations, DAT and optical disks. ....
Release Date 2013/07 -
Digital Filmmaking, 2nd Edition
Author Natalie Phillips , Thomas Ohanian
Digital Filmmaking has been called the bible for professional filmmakers in the digital age. It details all of the procedural, creative, and technical aspects of pre-production, production, and post-production within a digital filmmaking environment. It exami....
Release Date 2013/04 -
Digital Storytelling, 2nd Edition
Author Carolyn Handler Miller
Equally useful for seasoned professionals and those new to the field, Carolyn Handler Miller covers effective techniques for creating compelling narratives for a wide variety of digital media. Written in a clear, non-technical style, it offers insights into the proc....
Release Date 2008/04 -
The Manager's Pocket Guide to Diversity Management
Author Dr. Edward E. Hubbard
This pocket guide will teach you the skills required to effectively manage a diverse workplace—not because it's the "right thing to do" or your organization requires it, but because it is good for business. Gain diversity awareness, tools, knowledge and techniques ....
Release Date 2004/01 -
Wireless Security Architecture
Author Jennifer Minella , Stephen Orr
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutionsWireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrast....
Release Date 2022/04 -
IT's About Patient Care: Transforming Healthcare Information Technology the Cleveland Clinic Way
Author Gene Lazuta , Harris
A proven working model of healthcare IT as a transformative clinical and business engine—from one of the world’s leading healthcare organizationsExciting new technology is revolutionizing healthcare in the twenty-first century. This visionary guide by Cleveland Cli....
Release Date 2016/10 -
Social Evolution and Inclusive Fitness Theory
Author James A.R. Marshall
Social behavior has long puzzled evolutionary biologists, since the classical theory of natural selection maintains that individuals should not sacrifice their own fitness to affect that of others. Social Evolution and Inclusive Fitness Theory argues that a theory ....
Release Date 2015/04 -
Author Katie Cunningham
Get practical guidelines for making your website accessible to people with disabilities. With this handbook, you’ll learn how to design or develop a site that conforms to Section 508 of the US Rehabilitation Act—and in the process you’ll discover how to provide a be....
Release Date 2012/09 -
Author Lawrence E. Hughes
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required backgrou....
Release Date 2022/03 -
Understanding Government Contract Law
Author Terrance M. O'Connor
A “back-to-basics” guide to government contract lawFinally! A plain-English presentation of the basic legal concepts of government contract law for professionals at any stage in their careers.Until now, anyone in the procurement field has had to trudge through....
Release Date 2007/02 -
The Manager's Pocket Guide to Mega Thinking and Planning
Author Roger Kaufman
Our world is changing and changeable. Do you know where your organization is headed? Can you justify why you should go there? And provide the criteria for judging your progress and success? This pocket guide helps you through the process of creating a better future ....
Release Date 2011/01 -
Author Amr Sukkar
This book tries to support the elaboration and implementation of strategies and to foster SMEs and entrepreneurship development.Most of businesses fall within the category of start-up, small and medium size enterprises. Therefore, governments in part of their quest to reform the economy and related ....
Release Date 2022/08 -
Mastering Windows Security and Hardening - Second Edition
Author Mark Dunkerley , Matt Tumbarello
A comprehensive guide to administering and protecting the latest Windows 11 and Windows server operating system from ongoing cyber threats using zero-trust security principlesKey FeaturesLearn to protect your Windows environment using zero-trust and a multi-layered security approachImplement securit....
Release Date 2022/08 -
Application Security in the ISO 27001:2013 Environment
Author Vinod Vasudevan
Web application security as part of an ISO 27001-compliant information security management system Web application vulnerabilities are a common point of intrusion for cyber criminals. As cybersecurity threats proliferate and attacks escalate, and as applications pl....
Release Date 2015/10 -
Author James Forsythe , Burton Goldberg
Cancer rates continue to skyrocket, and the overall survival rate for Stage IV cancer patients in the United States is a grim 2.1 percent. Clearly, the extensive use of expensive, sometimes ineffective toxins in conventional oncology protocols is a failing strategy.....
Release Date 2012/05 -
Incident Response & Computer Forensics, 2nd Ed.
Author Chris Prosise , Kevin Mandia
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book s....
Release Date 2003/07 -
Simple Steps to Data Encryption
Author Peter Loshin
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to b....
Release Date 2013/04 -
VCP-Cloud Official Cert Guide (with DVD): VMware Certified Professional - Cloud
Author Tom Ralph , Nathan Raper
The Publisher regrets that the CD/DVD content for this title cannot be made available Online.VCP-Cloud Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" qui....
Release Date 2013/10 -
Digital Sub-Editing and Design
Author Stephen Quinn
This excellent book covers editing in the digital age, demonstrating the tools needed for effective text editing. Learn how to write powerful headlines and captions, and how to edit body text quickly and cleanly. It also concentrates on design in the digital e....
Release Date 2012/11 -
Sustainable Development and Governance in Europe
Author Thomas C. Hoerber , Pamela M. Barnes
This book analyses the evolution of the sustainability discourse in the European Union, exploring the conditions necessary for sustainable development to move from a conceptual model into a model for action for strategic decision makers at all levels of governance. ....
Release Date 2013/06 -
Digital Logic Testing and Simulation, 2nd Edition
Author Alexander Miczo
Your road map for meeting today's digital testing challengesToday, digital logic devices are common in products that impact public safety, including applications in transportation and human implants. Accurate testing has become more critical to reliability, safety,....
Release Date 2003/07