-
Fire Your Stock Analyst! Analyzing Stocks on Your Own
Author Harry Domash
In Fire Your Stock Analyst!, San Francisco Chronicle investment columnist Harry Domash presents a start-to-finish approach to stock selection that draws on winning techniques from the world's top money managers, uses readily available information, and is easy to im....
Release Date 2002/09 -
Being a Solo Librarian in Healthcare
Author Elizabeth C Burns
This book brings to light the current job responsibilities of the healthcare librarian, but at the same time reveals a dichotomy. In theory, advances in healthcare research promise better care and improved safety for patients. In practice, there are barriers that un....
Release Date 2015/05 -
Author Mary M. Somerville
By fostering principles of systems thinking and informed learning though an inclusive, participatory design process that advances information exchange, reflective dialogue, and knowledge creation, the Informed Systems Approach promotes conceptual change in workplace....
Release Date 2015/07 -
Intelligent Coatings for Corrosion Control
Author James Rawlins , Lloyd Hihara , Atul Tiwari
Intelligent Coatings for Corrosion Control covers the most current and comprehensive information on the emerging field of intelligent coatings. The book begins with a fundamental discussion of corrosion and corrosion protection through coatings, setting the stage fo....
Release Date 2014/10 -
Thinking Security: Stopping Next Year’s Hackers
Author Steven M. Bellovin
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re a....
Release Date 2015/11 -
Author Karen Pearlman
How does a film editor make decisions about where and when to cut in order to make a film 'feel right'? Generally speaking, the answer is, 'it's intuitive', which is accurate but leaves one wanting to know more. Cutting Rhythms breaks down the definition of int....
Release Date 2012/08 -
Author Joy R. Butler
If you actively use the internet to advance your business and professional endeavors, you are a cyber citizen and this book is for you. As a good cyber citizen, you want to stay legal online and protect your online interests. The Cyber Citizen’s Guide Th....
Release Date 2010/05 -
Cyber Security Policy Guidebook
Author Joseph Weiss , Jeffrey Schmidt , Marcus H. Sachs , Paul Rohmeyer , Jason Healey , Jen
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers ....
Release Date 2012/04 -
Supervision and Safety of Complex Systems
Author Jean Arlat , Yves Vandenboomgaerde , Nada Matta
This book presents results of projects carried out by both scientific and industry researchers into the techniques to help in maintenance, control, supervision and security of systems, taking into account the technical environmental and human factors.This work is su....
Release Date 2012/10 -
Integrating Program Management and Systems Engineering
Author Eric Rebentisch
Integrate critical roles to improve overall performance in complex engineering projectsIntegrating Program Management and Systems Engineering shows how organizations can become more effective, more efficient, and more responsive, and enjoy better performance outcom....
Release Date 2017/02 -
Alice and Bob Learn Application Security
Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development.... -
Digital Forensics and Internet of Things
Author Anita Gehlot , Rajesh Singh , Jaskaran Singh , Neeta Raj Sharma
DIGITAL FORENSICS AND INTERNET OF THINGSIt pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal.The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to a....
Release Date 2022/04 -
Cyber Security and Network Security
Author Sabyasachi Pramanik , Debabrata Samanta , M. Vinay , Abhijit Guha
CYBER SECUTIRY AND NETWORK SECURITYWritten and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly....
Release Date 2022/04 -
Cyber Mayday and the Day After
Author Daniel Lohrmann , Shamane Tan
Successfully lead your company through the worst crises with this first-hand look at emergency leadershipCyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event....
Release Date 2021/11 -
Author Brian O'Leary , Hugh McGuire
The rapid shakeup--from print to digital buying and reading--is a transitional phase, necessary in order to make the next jump, which is far bigger and more exciting: what happens when all books are truly digital, connected, ubiquitous. We're starting to have the i....
Release Date 2012/08 -
Feedback Control for Computer Systems
Author Philipp K. Janert
How can you take advantage of feedback control for enterprise programming? With this book, author Philipp K. Janert demonstrates how the same principles that govern cruise control in your car also apply to data center management and other enterprise systems. Through....
Release Date 2013/10 -
Federal IT Capital Planning and Investment Control (with CD)
Author Patricia A. Kelley , Thomas G. Kessler
Reduce risk and improve the overall performance of IT assets! Federal IT Capital Planning and Investment Control is the first book to provide a comprehensive look at the IT capital planning and investment control (CPIC) process. Written from a practitioner's ....
Release Date 2008/03 -
Router Security Strategies: Securing IP Network Traffic Planes
Author David J. Smith - CCIE No. 1986 , Gregg Schudel - CCIE No. 9591
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced tech....
Release Date 2007/12 -
Author Cameron Buchanan
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali LinuxIn DetailAs attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools ar....
Release Date 2014/07 -
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
Author Vijay Kumar Velu
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers.About This BookEmploy advanced pentesting techniques with Kali Linux to build highly-secured systemsGet to grips with various stealth techn....
Release Date 2017/06 -
OPNsense Beginner to Professional
Author Julio Cesar Bueno de Camargo
Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey FeaturesLearn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party plugins such as Nginx and SenseiGrasp hands-on exa....
Release Date 2022/06 -
The Ultimate Kali Linux Book - Second Edition
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchPurchase of the print or Kindle book includes a free eBook in the PDF formatKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using a....
Release Date 2022/02 -
ISO27001 Assessments Without Tears
Author Steve G. Watkins
The audit process can be a daunting one as an auditor can direct questions at any employee within your organisation. Written in a clear plain style, this pocket guide offers a tried and tested briefing, and should be issued to staff in advance of the audit to help t....
Release Date 2007/03 -
Instant Penetration Testing: Setting Up a Test Lab How-to
Author Vyacheslav Fadyushin
Set up your own penetration testing lab, using practical and precise recipesLearn something new in an Instant! A short, fast, focused guide delivering immediate results.A concise and clear explanation of penetration testing, and how you can benefit from itUnderstand....
Release Date 2013/03 -
MySpace Unraveled: A Parent’s Guide to Teen Social Networking from the Directors of BlogSafety.com
Author Anne Collier , Larry Magid
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience f....
Release Date 2006/08 -
Deploying Zone-Based Firewalls
Author Ivan Pepelnjak
Deploying Zone-Based Firewalls (Digital Short Cut)Ivan PepelnjakISBN: 1-58705-310-1Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the groupi....
Release Date 2006/11 -
Author Jayson E Street
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the worl....
Release Date 2015/07 -
Systems Engineering Principles and Practice, 2nd Edition
Author Steven M. Biemer , Samuel J. Seymour , William N. Sweet , Alexander Kossiakoff
The Bestselling Guide to the Engineering of Complex Systems, Now Thoroughly UpdatedThe first edition of this unique interdisciplinary guide has become the foundational systems engineering textbook for colleges and universities worldwide. It has helped countless rea....
Release Date 2011/05 -
Social Work Visions from Around the Globe
Author Anneli Pohjola , Pirkko-Liisa Ranhalon , Teppo Kroger , Anna Metten
Increase the effectiveness of the services you provide to clientsSocial Work Visions from Around the Globe examines the fundamental principles and dilemmas of social work with people whose health is under threat. This valuable resource was compiled from materi....
Release Date 2013/07