-
The Technical and Social History of Software Engineering
Author Capers Jones
“Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data. Now, Capers performs yet another invaluable service to our industry, by documenting, for the first time, i....
Release Date 2013/11 -
The Technological Entrepreneur’s Playbook
Author Ian Chaston
As exemplified by Apple and Google, maximizing the wealth of organizations involves what Joseph Schumpeter described as “creative destruction.” This occurs when scientific or technological breakthroughs lead to the launch of a radically new product or se....
Release Date 2017/05 -
The Trouble With Corporate Compliance Programs
Author Maurice E. Stucke , David Wasieleski , John Dienhart , Sean J. Griffith , Tom R. Tyl
Multinational corporations spend millions of dollars per year on compliance. In highly regulated industries, such as health care and finance, large companies spend much more, sometimes hiring hundreds or even thousands of compliance officers at a time. There is oft....
Release Date 2017/10 -
Author Russell von Frank
Trust, it binds us together in our deepest most fulfilling relationships, attracts and retains the best employees, and turns clients into raving fans. Let me show you how to heal old wounds, become a sought out business leader to work for, and create a loyal following of ....
Release Date 2020/11 -
The Truth About Computer Scams
Author Steve Weisman
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.What you must know about Internet scams: from phishing and Trojan horses to fake death threats!After installed on your computer, T....
Release Date 2010/11 -
Author J. Stuart Bunderson , Bret Sanner
Research on social species shows that hierarchies are important for group functioning. Human beings also have a tendency to think and act hierarchically. In fact, hierarchies — distinct differences in group members' power and status — can be found in v....
Release Date 2018/01 -
The Ultimate Kali Linux Book - Second Edition
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchPurchase of the print or Kindle book includes a free eBook in the PDF formatKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using a....
Release Date 2022/02 -
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Author Marcus Pinto , Dafydd Stuttard
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in ....
Release Date 2007/10 -
Theoretical Cybersecurity: Principles and Advanced Concepts
Author Jacob G. Oakley , Michael Butler , Wayne York , Matthew Puckett , J. Louis Sewell
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract an....
Release Date 2022/07 -
Thinking Security: Stopping Next Year’s Hackers
Author Steven M. Bellovin
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re a....
Release Date 2015/11 -
Author Will Gragido , Iain Davison , David DeSanto , John Pirc
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting....
Release Date 2016/05 -
Author Michael Collins
Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company’s network. In many organizations, security analysts initiate threat hunting when they spot something weird—network conditions or activ....
Release Date 2018/05 -
Author Chris Peiris , Binil Pillai , Abbas Kudrati
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting prosIn Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Bi....
Release Date 2021/10 -
Author Matthew J. Coles , Izar Tarandach
Threat modeling is one of the most essential—and most misunderstood—parts of the development lifecycle. Whether you’re a security practitioner or application developer, this book will help you gain a better understanding of core concepts and how to apply them to yo....
Release Date 2020/09 -
TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001
Author Shawn Porter , Debra Littlejohn Shinder , Mike Chapple
TICSA (TruSecure ICSA Computer Security Associate) is a popular new entry-level computer security certification aimed at individuals with 2 or more years of computer security experience or training equivalent to 48 hours in a 24 month period. TICSA represents base l....
Release Date 2002/09 -
Tissue Engineering Using Ceramics and Polymers, 2nd Edition
Author P.X. Ma , Aldo R Boccaccini
The second edition of Tissue Engineering Using Ceramics and Polymers comprehensively reviews the latest advances in this area rapidly evolving area of biomaterials science. Part one considers the biomaterials used for tissue engineering. It introduces the properties....
Release Date 2014/06 -
Tissue Engineering, 2nd Edition
Author Jan De Boer , Clemens Van Blitterswijk
Tissue Engineering is a comprehensive introduction to the engineering and biological aspects of this critical subject. With contributions from internationally renowned authors, it provides a broad perspective on tissue engineering for students coming to the subject ....
Release Date 2014/12 -
Tools for Signal Compression: Applications to Speech and Audio Coding
Author Nicolas Moreau
This book presents tools and algorithms required to compress/uncompress signals such as speech and music. These algorithms are largely used in mobile phones, DVD players, HDTV sets, etc.In a first rather theoretical part, this book presents the standard tools used i....
Release Date 2011/05 -
Top-Down Network Design, Third Edition
Author Priscilla Oppenheimer
Top-Down Network DesignThird EditionPriscilla OppenheimerA systems analysis approach to enterprise network designThe authoritative book on designing networks that align with business goalsTop-Down Network Design, Third Edition, is a practical and comprehensive guide....
Release Date 2010/08 -
Author Debra Golden , Margaret Murphy
You don't need to be a professional trainer to deliver a great training session. With a basic knowledge of adult learner preferences and instructional design, anyone can deliver engaging and useful training. This Infoline is designed with the "occasional" trainer i....
Release Date 2008/05 -
Transformational Governance: How Boards Achieve Extraordinary Change
Author Katha Kissman , Beth Gazley
There has never been so much pressure on nonprofit boards of directors to achieve a level of accountability that meets public and stakeholder expectations. Member-serving association boards may be especially challenged by their more complex affiliate structures and....
Release Date 2015/07 -
Author Frank Wander
Practical, proven guidance for transforming the culture of any IT departmentAs more and more jobs are outsourced, and the economy continues to struggle, people are looking for an alternative to the greed-driven, selfish leadership that has resulted in corporations w....
Release Date 2013/02 -
Author Claudia St. John , SPHR , SHRM-SCP
Human resources and management consultants are frequently asked to help their clients address fundamental breakdowns within their organizations. More often than not, these breakdowns occur between conflicting functional areas, such as sales and customer service, sa....
Release Date 2015/08 -
Transitioning to Quantum-Safe Cryptography on IBM Z
Author Bill White , Didier Andre , Gregg Arquero , Ritu Bajaj , Joe Cronin , Anne Dames , Hen
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break cl....
Release Date 2023/04 -
Author Cornelia Schweppe , Wolfgang Schröer , Adrienne Chambon
In the context of ever-increasing globalization, transnational systems of support have emerged in response to the needs of transnational families, labour forces, and the communities within which they are located. This volume will be the first to systematically addre....
Release Date 2013/06 -
Author Jennifer Jin , Marcus J. Carey
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published asTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introd....
Release Date 2019/08 -
Tribe of Hackers Security Leaders
Author Marcus J. Carey , Jennifer Jin
Tribal Knowledge from the Best in Cybersecurity LeadershipThe Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential securit....
Release Date 2020/03 -
Author Chris Brogan , Julien Smith
The 10th Anniversary Edition of Trust Agents helps companies get back on track in their efforts to build reputation, attention, and trust In the years since authors Chris Brogan and Julien Smith first released their groundbreaking book Trust Agents, social media....
Release Date 2020/07 -
Trust and Betrayal in the Workplace
Author Michelle L. Reina , Dennis S. Reina
More than ever, there is a need for trust in the workplace. After all, business is conducted via relationships, and trust is the foundation to effective relationships. Yet, trust means different things to different people and this is a big part of the problem. Coll....
Release Date 2006/01