-
Integrating Emergency Management and Disaster Behavioral Health
Author Ronald Sherman , Brian Flynn
Integrating Emergency Management and Disaster Behavioral Health identifies the most critical areas of integration between the profession of emergency management and the specialty of disaster behavioral health, providing perspectives from both of these critical area....
Release Date 2017/01 -
Airborne Electronic Hardware Design Assurance
Author Roy Vandermolen , Randall Fulton
Written by a Federal Aviation Administration (FAA) consultant designated engineering representative (DER) and an electronics hardware design engineer who together taught the DO-254 class at the Radio Technical Commission for Aeronautics, Inc. (RTCA) in Washington, D....
Release Date 2017/01 -
A Profile of the United States Toy Industry, Second Edition
Author Christopher Byrne
The toy industry is one of the most consistently misunderstood sectors of American business, comprising a wide range of businesses under one banner-entertainment, commodities, fashion and licensing-that each behave differently. Broad-based change is constant, with ....
Release Date 2017/01 -
Penetration Testing: A Survival Guide
Author Mohammed A. Imran , Srinivasa Rao Kotipalli , Juned Ahmed Ansari , Bo Weaver , Wolf
A complete pentesting guide facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxGain a deep understanding of the flaws in web applications and exploit them ....
Release Date 2017/01 -
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition
Author Aaron LeMasters , Sean M. Bodmer , Michael A. Davis , Christopher C. Elisan
Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootki....
Release Date 2016/12 -
Author Mark Klein , Dionisio de Niz , Raj Rajkumar
Learn the State of the Art in Embedded Systems and Embrace the Internet of ThingsThe next generation of mission-critical and embedded systems will be “cyber physical”: They will demand the precisely synchronized and seamless integration of complex sets of computati....
Release Date 2016/12 -
CCNA Routing and Switching Complete Review Guide, 2nd Edition
Author Todd Lammle
Tight, focused CCNA review covering all three examsThe CCNA Routing and Switching Complete Review Guide offers clear, concise review for Exams 100-105, 200-105, and 200-125. Written by best-selling certification author and Cisco guru Todd Lammle, this guide is your....
Release Date 2016/12 -
CEH Certified Ethical Hacker Practice Exams, Third Edition, 3rd Edition
Author Matt Walker
Don’t Let the Real Test Be Your First Test!Fully updated for the CEH v9 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council’s Certified Ethical Hacker exam. To aid in your understanding of....
Release Date 2016/12 -
Author Timothy Gallo , Allan Liska
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what st....
Release Date 2016/12 -
Microsoft System Center Endpoint Protection Cookbook - Second Edition
Author Nicolai Henriksen
Over 31 simple yet incredibly effective recipes for installing and managing System Center 2016 Endpoint ProtectionAbout This BookThis is the most practical and up-to-date book covering important new features of System Center 2016 Endpoint protectionGain confidence ....
Release Date 2016/12 -
Author Michael Mulholland
Bridging theory and practice, this book contains over 200 practical exercises and their solutions, to develop the problem-solving abilities of process engineers. The problems were developed by the author during his many years of teaching at university a....
Release Date 2016/12 -
Indoor Navigation Strategies for Aerial Autonomous Systems
Author Pedro Garcia Gil , Laura Elena Munoz Hernandez , Pedro Castillo-Garcia
Indoor Navigation Strategies for Aerial Autonomous Systems presents the necessary and sufficient theoretical basis for those interested in working in unmanned aerial vehicles, providing three different approaches to mathematically represent the dynamics of an aeria....
Release Date 2016/11 -
Author Araceli Treu Gomes , Ira Winkler
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book....
Release Date 2016/11 -
Author Kashmiri L. Mittal , Rajiv Kohli
Developments in Surface Contamination and Cleaning, Volume Ten, provides a state-of-the-art guide to the current knowledge on the behavior of film-type and particulate surface contaminants and their cleaning methods. This newest volume in the series discusses mecha....
Release Date 2016/11 -
CCSP Certified Cloud Security Professional All-in-One Exam Guide
Author Daniel Carter
This self-study guide delivers 100% coverage of all topics on the new CCSP examThis highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge, as established both by CSA and the (ISC)2. The book offers clear explanations of ev....
Release Date 2016/11 -
Handbook of System Safety and Security
Author Edward Griffor
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption o....
Release Date 2016/10 -
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Author Ali Dehghantanha , Kim-Kwang Raymond Choo
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners an....
Release Date 2016/10 -
Solar Heating and Cooling Systems
Author Calin Sebarchievici , Ioan Sarbu
Solar Heating and Cooling Systems: Fundamentals, Experiments and Applications provides comprehensive coverage of this modern energy issue from both a scientific and technical level that is based on original research and the synthesis of consistent bibliographic mat....
Release Date 2016/10 -
Cyber Security Engineering: A Practical Approach for Systems and Software Assurance
Author Carol C. Woody , Nancy R. Mead
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensi....
Release Date 2016/10 -
Author Dimitar P. Mishev , Aliakbar Montazer Haghighi
Presents an introduction to differential equations, probability, and stochastic processes with real-world applications of queues with delay and delayed network queuesFeaturing recent advances in queueing theory and modeling, Delayed and Network Queues provides the ....
Release Date 2016/10 -
CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition, 3rd Edition
Author Peter Gregory
This up-to-date self-study system offers 100% coverage of every topic on the 2016 version of the CISA examThe fully revised new edition delivers complete coverage of every topic on t....
Release Date 2016/10 -
IT's About Patient Care: Transforming Healthcare Information Technology the Cleveland Clinic Way
Author Gene Lazuta , Harris
A proven working model of healthcare IT as a transformative clinical and business engine—from one of the world’s leading healthcare organizationsExciting new technology is revolutionizing healthcare in the twenty-first century. This visionary guide by Cleveland Cli....
Release Date 2016/10 -
Fundamentals of Information Systems Security, 3rd Edition
Author Kim
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens w....
Release Date 2016/10 -
Workshop Mastery with Jimmy DiResta
Author John Baichtal , Jimmy DiResta
Jimmy DiResta has made a name for himself with his inventiveness and workshop skills, creating dozens of projects for YouTube videos and television shows such as Hammered and Against the Grain on the DIY network. In Make: Workshop Mastery With Jimmy DiResta, Jimmy ....
Release Date 2016/10 -
Mastering Modern Web Penetration Testing
Author Prakhar Prasad
Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!About This BookThis book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Se....
Release Date 2016/10 -
Author Abhilash G B
Learn to bake in disaster recovery readiness for your vSphere Infrastructure using vCenter SRM 6.1, leveraging array-based replication and vSphere Replication 6.1About This BookThis is the first book on the market that provides an extensive disaster recovery soluti....
Release Date 2016/10 -
Python: Penetration Testing for Developers
Author Dave Mound , Benjamin May , Andrew Mabbitt , Terry Ip , Cameron Buchanan , Mohit , Chr
Unleash the power of Python scripting to execute effective and efficient penetration testsAbout This BookSharpen your pentesting skills with PythonDevelop your fluency with Python to write sharper scripts for rigorous security testingGet stuck into some of the most....
Release Date 2016/10 -
Systems, Automation and Control
Author Nabil Derbel
Extended versions of awarded contributions of the International Conference on Systems, Analysis and Automatic Control, Barcelona 2014. Among the topics are: Adaptive Control, Predictive Control, Fuzzy Logic Control, System Identification, Expert and Knowledge Based....
Release Date 2016/10 -
Coding for Penetration Testers, 2nd Edition
Author Ryan Linn , Jason Andress
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool....
Release Date 2016/09 -
Eleventh Hour CISSP®, 3rd Edition
Author Joshua Feldman , Seth Misenar , Eric Conrad
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presente....
Release Date 2016/09