-
Systems Leadership, 2nd Edition
Author Karl Stewart , Catherine Burke , Ian Macdonald
The new edition of this influential and bestselling book is concerned with how people come together to achieve a productive purpose. Survival and success in business and social terms have always depended upon our ability to form and sustain social organisations. Pe....
Release Date 2018/05 -
The Enterprise Path to Service Mesh Architectures, 2nd Edition
Author Lee Calcote
Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This....
Release Date 2020/11 -
A Profile of the United States Toy Industry, Second Edition
Author Christopher Byrne
The toy industry is one of the most consistently misunderstood sectors of American business, comprising a wide range of businesses under one banner-entertainment, commodities, fashion and licensing-that each behave differently. Broad-based change is constant, with ....
Release Date 2017/01 -
Author Charles Bihis
Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkAbout This BookLearn how to use the OAuth 2.0 protocol to interact with the world's most popular ....
Release Date 2015/12 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
Windows Virus and Malware Troubleshooting
Author Mike Halsey , Andrew Bettany
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.Whatever version of Windows you're using, the threat of virus and malware infection is always a com....
Release Date 2017/03 -
Principles of Data Management - Facilitating information sharing Second edition
Author Keith Gordon
Data is a valuable corporate asset and its effective management can be vital to an organisation's success. This professional guide covers all the key areas of data management, including database development and corporate data modelling. It is business-focused, prov....
Release Date 2013/11 -
Successful Cybersecurity Professionals
Author Dr. Steven Brown
This book provides a unique perspective into the mindset of psychology and cybersecurity.It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals’ behavior, but our b....
Release Date 2020/09 -
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002, Second Edition
Author Michael Gregg
CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 examCASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition of the bestselling book covering the CASP certificat....
Release Date 2014/10 -
Author Bryan E. Harkins , David A. Westcott , David D. Coleman
The most detailed, comprehensive coverage of CWSP-205 exam objectivesCWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objecti....
Release Date 2016/09 -
CISSP Official (ISC)2 Practice Tests
Author David Seidl , Mike Chapple
Full-length practice tests covering all CISSP domains for the ultimate in exam prepThe CISSP Official (ISC)2 Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per dom....
Release Date 2016/07 -
31 Days Before Your CCNA Exam: A Day-by-Day Review Guide for the CCNA 640-802 Exam, Second Edition
Author Allan Johnson
31 Days Before your CCNA Exam, Second Edition, offers you a personable and practical way to understand the certification process, commit to taking the exam, and finish your preparation using a variety of Foundational and Supplemental study resources.The book breaks ....
Release Date 2008/11 -
Modern Control System Theory and Design, 2nd Edition
Author Stanley M. Shinners
The definitive guide to control system designModern Control System Theory and Design, Second Edition offers the most comprehensive treatment of control systems available today. Its unique text/software combination integrates classical and modern control system theor....
Release Date 1998/05 -
Computer Forensics JumpStart, Second Edition
Author Diane Barrett , Neil Broom , Ed Tittel , K Rudolph , Michael G. Solomon
Essential reading for launching a career in computer forensicsInternet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer....
Release Date 2011/03 -
Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
Author Jesus Vigo , Jr.
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that’s made of steel and won’t buckle when attacked!Ok, there’s no such thing as unhackable. No magic to....
Release Date 2022/12 -
Scene of the Cybercrime, 2nd Edition
Author Michael Cross , Debra Littlejohn Shinder
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the firs....
Release Date 2008/07 -
Practical Mobile Forensics - Third Edition
Author Heather Mahalik , Satish Bommisetty , Oleg Skulkin , Rohit Tamma
Investigate, analyze, and report iOS, Android, and Windows devicesAbout This BookGet hands-on experience in performing simple to complex mobile forensics techniques.Retrieve and analyze data stored not only on mobile devices but also through the cloud and other conn....
Release Date 2018/01 -
Hands-On Application Penetration Testing with Burp Suite
Author Riyaz Ahemed Walikar , Dhruv Shah , Carlos A. Lozano
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilitiesKey FeaturesMaster the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intru....
Release Date 2019/02 -
CISSP Exam Cram, Second Edition
Author Michael Gregg
Updated for 2009Covers the critical information you’ll need to know to score higher on your CISSP exam!Build and manage an effective, integrated security architectureSystematically protect your physical facilities and the IT resources they containImplement and admin....
Release Date 2009/03 -
CISSP®: Certified Information Systems Security Professional Study Guide, Fifth Edition
Author Mike Chapple , Ed Tittel , James Michael Stewart
Totally updated for 2011, here's the ultimate study guide for the CISSP examConsidered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive stu....
Release Date 2011/01 -
CompTIA Security+ Certification Study Guide: Network Security Essentials
Author Ahmed F. Sheikh
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and yo....
Release Date 2020/09 -
Network Protocols for Security Professionals
Author Yoram Orzach , Deepanshu Khanna
Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey FeaturesExploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database, DNS, voice, video, and collaboration server attac....
Release Date 2022/10 -
Author Robin Abernathy , Troy McMillan
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book.Learn, prepare, and practice for CISSP exam success with the CISSP Cert Guide from Pearson IT Certification, a lea....
Release Date 2013/11 -
Author Peter Yaworski
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbu....
Release Date 2019/06 -
Author Ric Messier
Intensively hands-on training for real-world network forensicsNetwork Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissecting packets, y....
Release Date 2017/08 -
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications
Author Sanjib Sinha
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your....
Release Date 2019/11 -
CompTIA Security+ Study Guide, 7th Edition
Author Chuck Easttom , Emmett Dulaney
Expert preparation covering 100% of Security+ exam SY0-501 objectivesCompTIA Security+ Study Guide, Seventh Edition offers invaluable preparation for Exam SY0-501. Written by an expert author team, this book covers 100% of the exam objectives with clear, concise ex....
Release Date 2017/10