-
Author Debra Golden , Margaret Murphy
You don't need to be a professional trainer to deliver a great training session. With a basic knowledge of adult learner preferences and instructional design, anyone can deliver engaging and useful training. This Infoline is designed with the "occasional" trainer i....
Release Date 2008/05 -
Author Lisa Chen , Lisa Witter
Women are a huge, uniquely receptive but still underutilized audience for a whole range of social and political causes, not just “women's issues.” In The She Spot, Lisa Witter and Lisa Chen, top executives in the nation's largest public interest communication....
Release Date 2008/06 -
The IT Regulatory and Standards Compliance Handbook
Author Craig S. Wright
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and t....
Release Date 2008/07 -
Scene of the Cybercrime, 2nd Edition
Author Michael Cross , Debra Littlejohn Shinder
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the firs....
Release Date 2008/07 -
Cisco Secure Firewall Services Module (FWSM)
Author Arvind CCIE No. 7016 Durai , Ray CCIE No. 7050 Blair
Cisco Secure Firewall Services Module (FWSM)Best practices for securing networks with FWSMRay Blair, CCIE® No. 7050Arvind Durai, CCIE No. 7016The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 ....
Release Date 2008/08 -
Version Control with Subversion, 2nd Edition
Author Brian W. Fitzpatrick , Ben Collins-Sussman , C. Michael Pilato
Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers Subversion 1.5 with a complete introduction and guided tour of its c....
Release Date 2008/09 -
Building Expertise: Cognitive Methods for Training and Performance Improvement
Author Ruth Colvin Clark
This third edition of the classic resource, Building Expertise draws on the most recent evidence on how to build innovative forms of expertise and translates that evidence into guidelines for instructional designers, course developers and facilitators, technical com....
Release Date 2008/09 -
Author Jason D. O’Grady
Here is your essential companion to the nuvi. The Garmin nuvi Pocket Guide steers you through how to: Set up and quickly start using your nuvi.Personalize nuvi.Find your destinations and points of interest (POIs).Master multiple-point routing.Create proximity alerts....
Release Date 2008/10 -
The CERT® C Secure Coding Standard
Author Robert C. Seacord
“I’m an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CER....
Release Date 2008/10 -
Metamodelling for Software Engineering
Author Brian Henderson-Sellers , Cesar Gonzalez-Perez
This book focuses on metamodelling as a discipline, exploring its foundations, techniques and results. It presents a comprehensive metamodel that covers process, product and quality issues under a common framework.Issues covered include:An explanation of what metamo....
Release Date 2008/10 -
Computer Forensics For Dummies®
Author Reynaldo Anzaldua , Linda Volonino
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving th....
Release Date 2008/10 -
ISO27001 / ISO27002 A Pocket Guide
Author Alan Calder
Use ISO27001 to protect your organisation's information assets This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Read this pocket guide to learn about: The ISO/IEC 27000Family of Info....
Release Date 2008/10 -
An Introduction to Information Security and ISO27001: A Pocket Guide
Author Steve G Watkins
This new pocket guide is intended to meet the needs of two groups: Individual readers who have turned to it as an introduction to a topic that they know little about; and organizations implementing, or considering implementing, some sort of information security mana....
Release Date 2008/10 -
CompTIA Security+™ Deluxe: Study Guide
Author Emmett Dulaney
CompTIA Security+ Deluxe Study Guide gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and insights drawn from real-world experience and review your newly acquire....
Release Date 2008/11 -
CompTIA Security+™: Study Guide, Fourth Edition
Author Emmett Dulaney
Revised and updated to include the most up-to-date information, CompTIA Security+ Study Guide, 4th Edition gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and i....
Release Date 2008/11 -
Author Michael Gregg , David R. Miller
Updated for the new CompTIA Security+ exam, this book focuses on the latest topics and technologies in the ever-evolving field of IT security and offers you the inside scoop on a variety of scenarios that you can expect to encounter on the job—as well as step-by-ste....
Release Date 2008/11 -
Author Andrew Mason
As a final exam preparation tool, the CCSP SNAF Quick Reference provides a concise review of all objectives on the SNAF exam (642-524). This digital Short Cut provides you with detailed, graphical-based information, highlighting only the key topics in cram-style for....
Release Date 2008/11 -
31 Days Before Your CCNA Exam: A Day-by-Day Review Guide for the CCNA 640-802 Exam, Second Edition
Author Allan Johnson
31 Days Before your CCNA Exam, Second Edition, offers you a personable and practical way to understand the certification process, commit to taking the exam, and finish your preparation using a variety of Foundational and Supplemental study resources.The book breaks ....
Release Date 2008/11 -
Managing Your Intellectual Property Assets
Author Scott Shane
This book outlines and illustrates strategies that you must employ to protect your intellectual property. There are legal means available to you, and this book defines these means and explains them in plain language. If you want to protect your innovative product an....
Release Date 2008/11 -
Data Protection vs. Freedom of Information
Author Paul Ticher
How would you respond to a freedom of information request, whilst ensuring compliance with the Data Protection Act?Get clear and practical guidance on this key data governance issue!Freedom of information is often mentioned in the same breath as data protection. In ....
Release Date 2008/11 -
Control Systems Engineering, Second Edition
Author S. K. Bhattacharya
Control Systems Engineering is a comprehensive text designed to cover the complete syllabi of the subject offered at various engineering disciplines at the undergraduate level. The book begins with a discussion on open-loop and closed-loop control systems. The block....
Release Date 2008/11 -
Assemble the Social Web with zembly
Author Chris Webster , Todd Fast , Paul Anderson , Gail Anderson
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More! With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and....
Release Date 2008/12 -
Author Tilak Mitra , Clive Gee , Robert G. Laird , William A. Brown
Address the #1 Success Factor in SOA Implementations: Effective, Business-Driven GovernanceInadequate governance might be the most widespread root cause of SOA failure. In SOA Governance, a team of IBM’s leading SOA governance experts share hard-won best practices f....
Release Date 2008/12 -
CompTIA Security+™: Review Guide
Author James M. Stewart
This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You’ll find this boo....
Release Date 2008/12 -
CompTIA Security+ Exam Cram, Second Edition
Author Martin Weiss , Kalani K. Hausman , Diane Barrett
CompTIA® Security+ Exam CramSecond EditionExam SY0-201Diane BarrettKirk HausmanMartin WeissThe Smart Way to Study™Covers the critical information you need to know to score higher on your Security+ exam!Master and implement general security best practicesSystematical....
Release Date 2008/12 -
How to Develop and Implement a Security Master Plan
Author Timothy Giles
Engage Stakeholders with a Long-Term SolutionThe goal: Convince executive management to "buy in" to your security program, support it, and provide the largest possible amount of funding.The solution: Develop a meticulously detailed long-term plan that sells decisio....
Release Date 2008/12 -
The Complete Idiot's Guide to Enhancing Your Social IQ
Author Gregory P. Korgeski
Simple steps to connecting with others. Now readers can raise their social intelligence quotient with a little self-Knowledge and practice. Beginning with a series of short quizzes that generate a personal social profile, this guide explains how readers can enhance....
Release Date 2008/12 -
Author George Spafford
Do you know what your IT systems cost your business in electricity?Organisations are not always aware of how much of their electricity bill goes on data storage. This is because the amount of money they are spending on the electricity for IT systems is often hidden ....
Release Date 2008/12 -
Author Robert Morgan , Jean-Louis Bravard
A focused, implementation-orientated, executive-level book on outsourcing by two globally known practitioners.The outsourcing market is booming, the total outsourcing market in EMA forecasts a $59 billion dollar growth between 2004 and 2007.Fills a fills a major gap....
Release Date 2009/01