-
Author Michele Orru , Christian Frichot , Wade Alcorn
Hackers exploit browser vulnerabilities to attack deep within networksThe Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a ....
Release Date 2014/03 -
Author André Årnes
The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical fieldWritten by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab)....
Release Date 2017/07 -
Author William Byers
In today's unpredictable and chaotic world, we look to science to provide certainty and answers--and often blame it when things go wrong. The Blind Spot reveals why our faith in scientific certainty is a dangerous illusion, and how only by embracing science's inhe....
Release Date 2011/03 -
Protect Your Wealth from the Ravages of Inflation: A Three-Step Method
Author Paul M. King
Protect Your Wealth from the Ravages of Inflation is for people who have financial assets to protect in an unpredictable, inflationary environment. Maybe you have tried traditional financial advice, financial planning, and passive investment management techniques an....
Release Date 2011/08 -
The Manager’s Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web
Author Ron Lepofsky
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnera....
Release Date 2014/12 -
Author Denny Cherry
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make r....
Release Date 2022/09 -
Author Becky Livingston
Web 2.0 is transforming workplace learning in many ways. This Infoline is designed to introduce you to the many Web 2.0 technologies available and give you ideas about how to implement them in your organization and will help you identify various social networking op....
Release Date 2010/01 -
Measuring and Improving Social Impacts
Author Kristi Yuthas , Marc J. Epstein
The world is beset with enormous problems. And as a nonprofit, NGO, foundation, impact investor, or socially responsible company, your organization is on a mission to solve them. But what exactly should you do? And how will you know whether it’s working? Too many ....
Release Date 2014/03 -
Author Michael E Cohen
Have you ever had to fill out and sign a PDF-based form? Or change the date on a PDF-based flyer? Comment on a document sent around your workplace as a PDF file? Scan a document to PDF and OCR the text? Smile's PDFpen 5 can perform these and many other PDF manipula....
Release Date 2010/10 -
Governance of IT - An executive guide to ISO/IEC 38500
Author A. L. Holt
Directors and government ministers across the world are increasingly being held accountable for failed IT systems, data loss and poor decisions about their organisation’s data. This valuable book is designed to bridge the gap between the governing body and CIOs/ IT ....
Release Date 2013/09 -
Bring Your Own Device - The mobile computing challenge
Author BCS , The Chartered Institute for IT
The increasing use of personal devices such as smartphones and tablets in the workplace at work is offering an opportunity as well as a challenge for organisations, in particular the IT department. This ebook looks at ways to embrace the benefits of BYOD while offer....
Release Date 2013/05 -
Building a Pentesting Lab for Wireless Networks
Author Andrey Popov , Vyacheslav Fadyushin
Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniquesAbout This BookDesign and build an extendable penetration testing lab with wireless access suitable for home and enterprise useFill the lab with various compo....
Release Date 2016/03 -
Certified Information Security Manager Exam Prep Guide
Author Hemang Doshi
Pass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey FeaturesPass the CISM exam confidently with this step-by-step guideExplore practical solutions that validate your knowledge and expertise in managing enterprise information s....
Release Date 2021/11 -
Practical Threat Intelligence and Data-Driven Threat Hunting
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat h.... -
ISO27001 / ISO27002 A Pocket Guide
Author Alan Calder
Use ISO27001 to protect your organisation's information assets This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Read this pocket guide to learn about: The ISO/IEC 27000Family of Info....
Release Date 2008/10 -
Sniffer Pro Network Optimization & Troubleshooting Handbook
Author Syngress
Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Networ....
Release Date 2002/08 -
Author Michael Mulholland
Bridging theory and practice, this book contains over 200 practical exercises and their solutions, to develop the problem-solving abilities of process engineers. The problems were developed by the author during his many years of teaching at university a....
Release Date 2016/12 -
Author Himanshu Dwivedi , Chris Clark , David Thiel
Secure today's mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how ....
Release Date 2010/02 -
Incident Response & Computer Forensics, Third Edition, 3rd Edition
Author Kevin Mandia , Matthew Pepe , Jason Luttgens
The definitive guide to incident response--updated for the first time in a decade!Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get ....
Release Date 2014/08 -
Quicken 2015 The Official Guide, 3rd Edition
Author Bobbi Sandberg
The ONLY official guide to the 2015 release of the #1 bestselling personal finance software“Intuit-approved and loaded with secrets, this book provides you with recipes for financial success.” –Scott Cook, Co-Founder, Intuit, Inc.Quicken 2015: The Official Guide sho....
Release Date 2014/11 -
How to Become an International Disaster Volunteer
Author Michael Noone
How to Become an International Disaster Volunteer discusses the immense value an experienced water systems engineer, trauma surgeon, or communications specialist could bring to a disaster stricken community, while also explaining how their professional educations d....
Release Date 2017/02 -
Getting Your Retirement Act Right
Author Trent Hamm
This Element is an excerpt from The Simple Dollar: How One Man Wiped Out His Debts and Achieved the Life of His Dreams (9780137054251) by Trent Hamm. Available in print and digital formats.Retirement: how to start imagining and planning your exciting “next act”!Reti....
Release Date 2010/07 -
Author Luke Wroblewski
Our industry’s long wait for the complete, strategic guide to mobile web design is finally over. Former Yahoo! design architect and co-creator of Bagcheck Luke Wroblewski knows more about mobile experience than the rest of us, and packs all he knows into this entert....
Release Date 2011/05 -
Network Defense and Countermeasures: Principles and Practices, Second Edition
Author William Easttom II
Network Defense and Countermeasures:Principles and PracticesEverything you need to know about modern network attacks and defense, in one bookClearly explains core network security concepts, challenges, technologies, and skills Thoroughly updated for the latest attac....
Release Date 2013/10 -
Programming Mobile Devices: An Introduction for Practitioners
Author Tommi Mikkonen
With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems.Learn how to programme the mobile devices of the future!The importance of mobile systems programming has emerged over the recent years as a new domain in software development. The design of ....
Release Date 2007/03 -
Author Sunil Wadhwa , Joe Kelly , Ken Draper , David Delcourt , Vik Davar , Stefan Brunner
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutio....
Release Date 2008/02 -
Sliding Mode Control of Uncertain Parameter-Switching Hybrid Systems
Author Xiaojie Su , Peng Shi , Ligang Wu
In control theory, sliding mode control (SMC) is a nonlinear control method that alters the dynamics of a nonlinear system by application of a discontinuous control signal that forces the system to slide along a cross-section of the system's normal behaviour. In re....
Release Date 2014/07 -
Social Movements for Good: How Companies and Causes Create Viral Change
Author Derrick Feldmann
Create real change in the new social movement paradigmSocial Movements for Good is a guidebook for driving change, by taking advantage of the social "currency" that makes movements go viral. Author Derrick Feldmann has spent a career showing organizations how to be....
Release Date 2016/02 -
Author David D. Busch
DAVID BUSCH'S NIKON D3200 GUIDE TO DIGITAL SLR PHOTOGRAPHY is your onestop resource and reference for the Nikon D3200, the latest entrylevel DSLR in the Nikon product line, featuring a 16.2 megapixel sensor, full HDTV video, and ISO up to 12,800. With this book in ....
Release Date 2012/07