-
Biometrics for Network Security
Author Paul Reid
The complete guide to implementing biometric security solutions for your networkNetwork security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers t....
Release Date 2003/12 -
Big Data Analytics with Applications in Insider Threat Detection
Author Latifur Khan , Mohammad Mehedy Masud , Pallabi Parveen , Bhavani Thuraisingham
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malwa....
Release Date 2017/11 -
Author Tony Crescenzi
During the Great Depression, legendary British economist Keynes advocated using government money to fill the economic void until consumer spending and business investment recovered. But what happens when governments can't do that anymore? You've arrived at "The Ke....
Release Date 2011/10 -
Benefit Corporation Law and Governance
Author Frederick Alexander
Corporations with a ConscienceCorporations today are embedded in a system of shareholder primacy. Nonfinancial concerns—like worker well-being, environmental impact, and community health—are secondary to the imperative to maximize share price. Benefit corporat....
Release Date 2017/10 -
Being a Solo Librarian in Healthcare
Author Elizabeth C Burns
This book brings to light the current job responsibilities of the healthcare librarian, but at the same time reveals a dichotomy. In theory, advances in healthcare research promise better care and improved safety for patients. In practice, there are barriers that un....
Release Date 2015/05 -
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Author Sanjib Sinha
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux....
Release Date 2018/11 -
Beginning Blackberry 7 Development
Author Kevin Michaluk , Anthony Rizk , Dante Sarigumba , Robert Kao
Are you interested in creating BlackBerry apps using the latest BlackBerry 7 and BlackBerry Java Plug-in for Eclipse? Then this is the book for you. Beginning BlackBerry 7 Development offers a hands-on approach to learning how to build and deploy sophisticated Black....
Release Date 2011/11 -
Beginning Application Lifecycle Management
Author Joachim Rossberg
Beginning Application Lifecycle Management is a guide to an area of rapidly growing interest within the development community: managing the entire cycle of building software. ALM is an area that spans everything from requirements specifications to retirement of an I....
Release Date 2014/09 -
Author Adrian Pruteanu
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker.Key FeaturesBuilds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Exa....
Release Date 2019/01 -
Author Andy Oram , John Viega
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by....
Release Date 2009/04 -
Author Janos Gyerik
Primarily written for those who are new to version control systems, this easy-to-follow guide to Bazaar will quickly make you an expert. From basic principles to creating plugins – it’s all here.Gain an understanding of what version control is, and how you can benef....
Release Date 2013/06 -
BackTrack 5 Wireless Penetration Testing Beginner’s Guide
Author Vivek Ramachandran
Master bleeding edge wireless testing techniques with BackTrack 5.Learn Wireless Penetration Testing with the most recent version of BacktrackThe first and only book that covers wireless testing with BackTrackConcepts explained with step-by-step practical sessions a....
Release Date 2011/09 -
BackTrack 4: Assuring Security by Penetration Testing
Author Shakeel Ali , Tedi Heriyanto
Overview of BackTrack 4: Assuring Security by Penetration TestingLearn the black-art of penetration testing with in-depth coverage of BackTrack Linux distributionExplore the insights and importance of testing your corporate network systems before hackers strike itUn....
Release Date 2011/04 -
Back to the Land: Arthurdale, FDR's New Deal, and the Costs of Economic Planning
Author C. J. Maloney
How New Deal economic policies played out in the small town of Arthurdale, West VirginiaToday, the U.S. government is again moving to embrace New Deal-like economic policies. While much has been written about the New Deal from a macro perspective, little has been wr....
Release Date 2013/12 -
Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the im.... -
Author Dylan Shields
Running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS. In AWS Security you’ll learn how to: Securely grant access to AWS resources to coworkers and customersDevelop policies....
Release Date 2022/09 -
Authentication and Access Control: Practical Cryptography Methods and Tools
Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked.This book begins with the theoretical background of cryptography and the foundations of authentica.... -
Auditing IT Infrastructures for Compliance, 3rd Edition
Author Robert Johnson , Marty Weiss , Michael G. Solomon
The third edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how t....
Release Date 2022/10 -
Auditing IT Infrastructures for Compliance, 2nd Edition
Author Weiss
The Second Edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a....
Release Date 2015/07 -
Auditing IT Infrastructures for Compliance
Author Michael G. Solomon , Martin Weiss
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Information systems and IT infrastructures are no longer void from governance and compliance given recent U.S.-based compliancy laws that were consummated during the ear....
Release Date 2010/09 -
Auditing Information Systems, Second Edition
Author Jack J. Champlain
Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing compu....
Release Date 2003/02 -
Author Brad Hibbert , Morey J. Haber
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, ev....
Release Date 2018/06 -
Author David LeBlanc , Kevin Lam , Ben Smith
Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques—straight from members of the Microsoft Security Team.
Release Date 2004/07 -
Assemble the Social Web with zembly
Author Chris Webster , Todd Fast , Paul Anderson , Gail Anderson
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More! With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and....
Release Date 2008/12 -
Architecting Mobile Solutions for the Enterprise
Author Dino Esposito
Your guide to planning and executing a complete mobile web strategyRevisit your approach to the mobile web—and deliver effective solutions that reach customers and clients on a variety of mobile devices. In this practical guide, web development luminary Dino Esposit....
Release Date 2012/05 -
Applying Social Tools to Learning
Author Dave Wilkins
With social learning, the whole company is part of the learning and development team. This Infoline will show you how to strategically design effective and agile social learning strategies that address the unique needs of various learning initiatives. Learn about th....
Release Date 2012/04 -
Author Michael Mulholland
Bridging theory and practice, this book contains over 200 practical exercises and their solutions, to develop the problem-solving abilities of process engineers. The problems were developed by the author during his many years of teaching at university a....
Release Date 2016/12 -
Applied Network Security Monitoring
Author Jason Smith , Chris Sanders
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring i....
Release Date 2013/11