-
Author Tobias Klein
"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."–Felix 'FX' LindnerA Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world....
Release Date 2011/11 -
Nessus Network Auditing, 2nd Edition
Author Russ Rogers
The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth....
Release Date 2011/10 -
Author Michael E Cohen
Have you ever had to fill out and sign a PDF-based form? Or change the date on a PDF-based flyer? Comment on a document sent around your workplace as a PDF file? Scan a document to PDF and OCR the text? Smile's PDFpen 5 can perform these and many other PDF manipula....
Release Date 2010/10 -
Author Zaid Hassan
Current responses to our most pressing societal challenges—from poverty to ethnic conflict to climate change—are not working. These problems are incredibly dynamic and complex, involving an ever-shifting array of factors, actors, and circumstances. They demand a hig....
Release Date 2014/02 -
Business Continuity Management Systems - Implementation and certification to ISO 22301
Author Hilary Estall
This practical guide is written for organisations who are implementing a business continuity management system and certification in line with ISO 22301. It will prove invaluable for those new to business continuity management or to management systems. Enriched with....
Release Date 2012/09 -
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Author Kevin Cardwell , Lee Allen
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environmentsAbout This BookLearn how to build your own pentesting lab environment to practice advanced techniquesCustomize your own scripts, and learn methods to exploit 32....
Release Date 2016/03 -
The Ransomware Threat Landscape
Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in p.... -
ISO27001 / ISO27002 A Pocket Guide
Author Alan Calder
Use ISO27001 to protect your organisation's information assets This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Read this pocket guide to learn about: The ISO/IEC 27000Family of Info....
Release Date 2008/10 -
CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS)
Author Earl Carter
Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policiesReview techniques applicable to both network- and host-based platformsReview the security wheel concepts and apply security to AVVID using the SAFE BlueprintInstall and c....
Release Date 2004/02 -
Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)
Author Mike Meyers
An all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike MeyersIn Mike Meyers’ CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effect....
Release Date 2015/07 -
Author John Sammons
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad rang....
Release Date 2015/12 -
A Short Overview of Social Networks and Their Uses
Author Juliette Powell
This Element is an excerpt from 33 Million People in the Room: How to Create, Influence, and Run a Successful Business with Social Networking (9780137154357) by Juliette Powell. Available in print and digital formats.Profiling the world of social networks: what you ....
Release Date 2010/05 -
Corporate Governance Matters: A Closer Look at Organizational Choices and Their Consequences
Author Brian Tayan , David Larcker
Corporate Governance Matters gives corporate board members, officers, directors, and other stakeholders the full spectrum of knowledge they need to implement and sustain superior governance. Authored by two leading experts, this comprehensive reference thoroughly ad....
Release Date 2011/04 -
The PayPal Official Insider Guide to Internet Security: Spot scams and protect your online business
Author Michelle Savage
Technology moves fast. So do criminals. Cyber attacks hit large and small merchants alike, phishers and fraudsters seem to be everywhere, and identity theft is prevalent. But this is not the end of the world, and you can’t afford to hide in the closet. Your customer....
Release Date 2012/10 -
Network Basics Companion Guide
Author Cisco Networking Academy
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.Using a top-down OSI model approach, the course introduces the architecture, structure, f....
Release Date 2013/12 -
The Effect of Temperature and other Factors on Plastics and Elastomers, 3rd Edition
Author Laurence W. McKeen
This reference guide brings together a wide range of critical data on the effect of temperature on plastics and elastomers, enabling engineers to make optimal material choices and design decisions. The effects of humidity level and strain rate on mechanical and elec....
Release Date 2014/04 -
Error Control Coding For B3G/4G Wireless Systems: Paving the Way to IMT-Advanced Standards
Author Dr. Moshe Ran , Dr. Thierry Lestable
Covering the fast evolving area of advanced coding, Error Control Coding for B3G/4G Wireless Systems targets IMT-Advanced systems to present the latest findings and implementation solutions. The book begins by detailing the fundamentals of advanced coding techniques....
Release Date 2011/06 -
Author Michele Orru , Christian Frichot , Wade Alcorn
Hackers exploit browser vulnerabilities to attack deep within networksThe Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a ....
Release Date 2014/03 -
Sliding Mode Control of Uncertain Parameter-Switching Hybrid Systems
Author Xiaojie Su , Peng Shi , Ligang Wu
In control theory, sliding mode control (SMC) is a nonlinear control method that alters the dynamics of a nonlinear system by application of a discontinuous control signal that forces the system to slide along a cross-section of the system's normal behaviour. In re....
Release Date 2014/07 -
Social Movements for Good: How Companies and Causes Create Viral Change
Author Derrick Feldmann
Create real change in the new social movement paradigmSocial Movements for Good is a guidebook for driving change, by taking advantage of the social "currency" that makes movements go viral. Author Derrick Feldmann has spent a career showing organizations how to be....
Release Date 2016/02 -
The Official (ISC)2 Guide to the SSCP CBK, 3rd Edition
Author Steven Hernandez , Adam Gordon
The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is one of the most popular and ideal credential for those wanting to expand their security career and highlight their security skills. If you are looking to embark on the journey towards your (....
Release Date 2015/11 -
Author William Byers
In today's unpredictable and chaotic world, we look to science to provide certainty and answers--and often blame it when things go wrong. The Blind Spot reveals why our faith in scientific certainty is a dangerous illusion, and how only by embracing science's inhe....
Release Date 2011/03 -
Protect Your Wealth from the Ravages of Inflation: A Three-Step Method
Author Paul M. King
Protect Your Wealth from the Ravages of Inflation is for people who have financial assets to protect in an unpredictable, inflationary environment. Maybe you have tried traditional financial advice, financial planning, and passive investment management techniques an....
Release Date 2011/08 -
Author Eric J Gruber
Like to build websites in the wild with your MacBook? This concise hands-on guide introduces you to the ideal editor: Coda 2. Rather than clutter your screen with shell access, a separate CSS editor, and a version control app, you’ll discover how Coda’s "one-window ....
Release Date 2013/01 -
The Little Book of HTML/CSS Coding Guidelines
Author Jens Oliver Meiert
A proper plan can improve your code, including your HTML documents and CSS style sheets. Jens Oliver Meiert explores the theory and practice of coding guidelines and shows, using Google’s HTML and CSS standards as a particular example, how consistency and care can ....
Release Date 2015/12 -
Author Gretchen Anderson
Designers of all stripes today are seeking social and civic projects that have a mission to serve the greater good at their core. Part of this growing trend stems from the desire to use skills for their highest potential. But the real payoff is the ability to use n....
Release Date 2015/06 -
Air and Missile Defense Systems Engineering
Author John B. Hoffman , Warren J. Boord
Air and Missile Defense Systems Engineering fills a need for those seeking insight into the design procedures of the air and missile defense system engineering process. Specifically aimed at policy planners, engineers, researchers, and consultants, it presents a ba....
Release Date 2016/04 -
Author Becky Livingston
Web 2.0 is transforming workplace learning in many ways. This Infoline is designed to introduce you to the many Web 2.0 technologies available and give you ideas about how to implement them in your organization and will help you identify various social networking op....
Release Date 2010/01 -
Measuring and Improving Social Impacts
Author Kristi Yuthas , Marc J. Epstein
The world is beset with enormous problems. And as a nonprofit, NGO, foundation, impact investor, or socially responsible company, your organization is on a mission to solve them. But what exactly should you do? And how will you know whether it’s working? Too many ....
Release Date 2014/03