-
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Author Wil Allsopp
The first guide to planning and performing a physical penetration test on your computer's securityMost IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT ....
Release Date 2009/09 -
Unmanned Aerial Vehicles: Embedded Control
Author Rogelio Lozano
This book presents the basic tools required to obtain the dynamical models for aerial vehicles (in the Newtonian or Lagrangian approach). Several control laws are presented for mini-helicopters, quadrotors, mini-blimps, flapping-wing aerial vehicles, planes, etc. Fi....
Release Date 2010/03 -
Author Stephen Trachtenberg , Susan R. Pierce
Revamp senior administration organization for more effective governanceGovernance Reconsidered: How Boards, Presidents, Administrators, and Faculty Can Help Their Colleges Thrive takes an in-depth look at the current practice of governance in higher education and ex....
Release Date 2014/05 -
Alice and Bob Learn Application Security
Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development.... -
Cyber Security and Network Security
Author Sabyasachi Pramanik , Debabrata Samanta , M. Vinay , Abhijit Guha
CYBER SECUTIRY AND NETWORK SECURITYWritten and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly....
Release Date 2022/04 -
Security Policies and Implementation Issues, 2nd Edition
Author Johnson
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies and Implementation Issues, Second Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational....
Release Date 2014/08 -
Social Evolution and Inclusive Fitness Theory
Author James A.R. Marshall
Social behavior has long puzzled evolutionary biologists, since the classical theory of natural selection maintains that individuals should not sacrifice their own fitness to affect that of others. Social Evolution and Inclusive Fitness Theory argues that a theory ....
Release Date 2015/04 -
Network Security Through Data Analysis
Author Michael S Collins
In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided i....
Release Date 2014/02 -
Author Denny Cherry
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make r....
Release Date 2022/09 -
ISO 50001 Energy Management Systems
Author Johannes Kals
Managers and academia targeting energy performance improvements have a valuable tool in ISO 50001 Energy Management Systems, which allows for a certification after third-party audits. Business managers may reduce costs and fully tap the strategic potential ....
Release Date 2015/07 -
Information Security Management Principles, 3rd Edition
Author Andy Taylor , David Alexander , Amanda Finch , David Sutton
This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book support....
Release Date 2020/01 -
Learning iOS Penetration Testing
Author Swaroop Yermalkar
Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration testsAbout This BookAchieve your goal to secure iOS devices and applications with the help of this fast paced manualFind vulnerabilities in your iOS applications and fix them w....
Release Date 2016/01 -
Hack the Cybersecurity Interview
Author Ken Underhill , Christophe Foulon , Tia Hopkins , Mari Galloway
Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for cybersecurity job rolesPrepare for SOC analyst, penetra....
Release Date 2022/07 -
OPNsense Beginner to Professional
Author Julio Cesar Bueno de Camargo
Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey FeaturesLearn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party plugins such as Nginx and SenseiGrasp hands-on exa....
Release Date 2022/06 -
Practical Threat Intelligence and Data-Driven Threat Hunting
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat h.... -
ISO27001 Assessments Without Tears
Author Steve G. Watkins
The audit process can be a daunting one as an auditor can direct questions at any employee within your organisation. Written in a clear plain style, this pocket guide offers a tried and tested briefing, and should be issued to staff in advance of the audit to help t....
Release Date 2007/03 -
How to Use Web 2.0 and Social Networking Sites Securely
Author IT Governance Research Team
This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.
Release Date 2009/01 -
Author James Forsythe , Burton Goldberg
Cancer rates continue to skyrocket, and the overall survival rate for Stage IV cancer patients in the United States is a grim 2.1 percent. Clearly, the extensive use of expensive, sometimes ineffective toxins in conventional oncology protocols is a failing strategy.....
Release Date 2012/05 -
Designing Trustworthy Organizations
Author Robert F. Hurley , Nicole Gillespie , Donald L. Ferrin , Graham Dietz
In the aftermath of the well-publicized frauds of Enron, WorldCom and Tyco circa 2001 and 2002, there were major efforts in the United States to restore trust and enforce corporate compliance. Among other things, the U.S. Congress passed the Sarbanes-Oxley Act ....
Release Date 2013/07 -
Intelligent Coatings for Corrosion Control
Author James Rawlins , Lloyd Hihara , Atul Tiwari
Intelligent Coatings for Corrosion Control covers the most current and comprehensive information on the emerging field of intelligent coatings. The book begins with a fundamental discussion of corrosion and corrosion protection through coatings, setting the stage fo....
Release Date 2014/10 -
Author Will Gragido , Iain Davison , David DeSanto , John Pirc
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting....
Release Date 2016/05 -
Getting Your Retirement Act Right
Author Trent Hamm
This Element is an excerpt from The Simple Dollar: How One Man Wiped Out His Debts and Achieved the Life of His Dreams (9780137054251) by Trent Hamm. Available in print and digital formats.Retirement: how to start imagining and planning your exciting “next act”!Reti....
Release Date 2010/07 -
Thinking Security: Stopping Next Year’s Hackers
Author Steven M. Bellovin
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re a....
Release Date 2015/11 -
IT Systems Management, Second Edition
Author Rich Schiesser
The best-practice guide to managing IT infrastructures–now fully updated!IT Systems Management is an up-to-the-minute guide to maintaining stable, responsive IT production environments. Top IT systems management expert Rich Schiesser illuminates both the theoretical....
Release Date 2010/01 -
Introduction to Digital Video, 2nd Edition
Author John Watkinson
Covers the essential fundamentals of digital video: from video principles, to conversion, compression, coding, interfaces and output. Written for television professionals needing to apply digital video systems, equipment and techniques to multimedia and /or di....
Release Date 2012/09 -
Routledge Handbook of Constitutional Law
Author Cheryl Saunders , Thomas Fleiner , Mark Tushnet
The Routledge Handbook of Constitutional Law is an advanced level reference work which surveys the current state of constitutional law. Featuring new, specially commissioned papers by a range of leading scholars from around the world, it offers a comprehensive overv....
Release Date 2013/06 -
Author Ray Tricker
This "hands on" book provides practical information on how to cost effectively set up an ISO 9001: 2000 compliant Quality Management System. The new ISO 9000:2000 family is an all-encompassing series of standards that lay down requirements for incorporating the mana....
Release Date 2013/06 -
Fuzzy Control and Identification
Author John H. Lilly
This book gives an introduction to basic fuzzy logic and Mamdani and Takagi-Sugeno fuzzy systems. The text shows how these can be used to control complex nonlinear engineering systems, while also also suggesting several approaches to modeling of complex engineering ....
Release Date 2010/12 -
Network Attacks and Exploitation
Author Matthew Monte
Incorporate offense and defense for a more effective network security strategyNetwork Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. ....
Release Date 2015/08