-
Option Trading Loss Recovery Strategies
Author Michael C. Thomsett
How options can help you recover losses in stock investments you still want to keep.In volatile markets, inevitable paper losses tie up capital and prevent you from moving ahead. So what do you do? Do you just wait and hope the market price rebounds? Do you cut your....
Release Date 2010/06 -
Author Chris Jackson - CCIE No. 6256
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.Cisco network security expert Chris Jackson begins with a thorough overview ....
Release Date 2010/06 -
Seven Deadliest Network Attacks
Author Mike Borkin , Rob Kraus , Stacy Prowell
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and ....
Release Date 2010/06 -
Unequal Protection, 2nd Edition
Author Thom Hartmann
Unequal taxes, unequal accountability for crime, unequal influence, unequal control of the media, unequal access to natural resources—corporations have gained these privileges and more by exploiting their legal status as persons. How did something so illogical ....
Release Date 2010/06 -
International Social Entrepreneurship
Author Joseph Mark Munoz
The book is attractive to the target readers for the following reasons : 1) there has been a growing interest in the topic of social entrepreneurship and yet there are limited academic materials, this book will offer a concise, straight-forward compilation of theori....
Release Date 2010/06 -
Coping with Unplanned Absences: A Pocket Guide
Author Sarah Cook
Unplanned absence from work could cost the UK economy as much as £12 billion a year! When your organisation can no longer meet its deadlines, or provide customers with the high quality of service they expect, you have a problem. Unplanned absence also has a bad effe....
Release Date 2010/06 -
Author Shon Harris
Don't Let the Real Test Be Your First Test!Written by the leading expert in IT security certification and training, CISSP Practice Exams is filled with hundreds of realistic practice exam questions based on the latest release of the Certified Information Systems Se....
Release Date 2010/07 -
Designing an IAM Framework with Oracle Identity and Access Management Suite
Author Scheidel Jeff
Develop and Implement an End-to-End IAM Solution Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management....
Release Date 2010/07 -
Getting Your Retirement Act Right
Author Trent Hamm
This Element is an excerpt from The Simple Dollar: How One Man Wiped Out His Debts and Achieved the Life of His Dreams (9780137054251) by Trent Hamm. Available in print and digital formats.Retirement: how to start imagining and planning your exciting “next act”!Reti....
Release Date 2010/07 -
Author Richard Watson , Stephen Pearson
Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex....
Release Date 2010/07 -
Author Ben Forta
Written by the best known and most trusted name in the ColdFusion community, Ben Forta, The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time. Volume 3: Advanced Application Development, focuses on application security, sc....
Release Date 2010/08 -
Top-Down Network Design, Third Edition
Author Priscilla Oppenheimer
Top-Down Network DesignThird EditionPriscilla OppenheimerA systems analysis approach to enterprise network designThe authoritative book on designing networks that align with business goalsTop-Down Network Design, Third Edition, is a practical and comprehensive guide....
Release Date 2010/08 -
Where Does Social Security Fit Into Your Retirement?
Author Paul B. Brown , Frank Armstrong
This Element is an excerpt from Save Your Retirement: What to Do If You Haven’t Saved Enough or If Your Investments Were Devastated by the Market Meltdown (9780137029006) by Frank Armstrong, III and Paul B. Brown. Available in print and digital formats.A clear-eyed ....
Release Date 2010/09 -
System Forensics, Investigation, and Response
Author K Rudolph , John R. Vacca
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response begins by examining....
Release Date 2010/09 -
Auditing IT Infrastructures for Compliance
Author Michael G. Solomon , Martin Weiss
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Information systems and IT infrastructures are no longer void from governance and compliance given recent U.S.-based compliancy laws that were consummated during the ear....
Release Date 2010/09 -
The Jelly Effect: How to make your communication stick
Author Andy Bounds
Like throwing jelly at a wall, poor communication never sticks.Too much information and not enough relevance is a problem that pervades almost all business communication. So what's the answer? More relevance and a lot less jelly.The Jelly Effect teaches you simple,....
Release Date 2010/09 -
Rebuilding Trust in the Workplace
Author Michelle L. Reina , Dennis S. Reina
If so, you may be experiencing the confidence-busting, commitment-breaking, energy-draining patterns consistent with broken trust. We've all been there, but few of us know how to rebuild that trust. Dennis and Michelle Reina have spent their careers researchin....
Release Date 2010/09 -
Author Peter Sidorko , Steve O’Connor
In this information age it is widely recognised that, in order to maintain relevance and to gain a competitive edge, libraries and other organisations in the business of information must continuously assess their roles, collections, services and perhaps most importa....
Release Date 2010/09 -
Environmental Protection and the Social Responsibility of Firms
Author Richard Professor Vietor , Robert Professor Stavins , Bruce Professor Hay
Everyone agrees that firms should obey the law. But beyond what the law requires-beyond bare compliance with regulations-do firms have additional social responsibilities to commit resources voluntarily to environmental protection? How should we think about firms sac....
Release Date 2010/09 -
Power System Operation and Control
Author N. V. Ramana
Power System Operation and Control is a comprehensive text designed for an undergraduate course in electrical engineering. Written in a simple and easy-to-understand manner, the book introduces the reader to economic operation of power system and reactive power cont....
Release Date 2010/09 -
Principles of Digital Audio, Sixth Edition, 6th Edition
Author Ken C. Pohlmann
The definitive guide to digital engineering--fully updatedGain a thorough understanding of digital audio tools, techniques, and practices from this completely revised and expanded resource. Written by industry pioneer and Audio Engineering Society Fellow Ken C. Pohl....
Release Date 2010/10 -
HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
Author Sima Caleb , Liu Vincent , Scambray Joel
The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today’s hacker. Written by recognized security practitioners and thought leaders, ....
Release Date 2010/10 -
Author Tony Crescenzi
What happens now? Economics in an age when fiscal stimulus can’t be funded and no longer works.After Lehman fell, the scope of the financial crisis became so great that only the fiscal and monetary authorities possessed balance sheets large enough to resolve it. But....
Release Date 2010/10 -
Social Innovation, Inc.: 5 Strategies for Driving Business Growth through Social Change
Author Jason Saul
Could Wal-Mart offer a better solution to healthcare than Medicaid? Could GE help reduce global warming faster than the Kyoto protocol?Social Innovation, Inc. declares a new era where companies profit from social change. Leading corporations like GE, Wellpoint, Trav....
Release Date 2010/10 -
Access Control, Authentication, and Public Key Infrastructure
Author Tricia Ballad , Bill Ballad , Erin Banks
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and pr....
Release Date 2010/10 -
Security Policies and Implementation Issues
Author Mark Merkow , Robert Johnson
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! The study of information system security concepts and domains is an essential part of the education of computer science students and professionals alike. Security Polic....
Release Date 2010/10 -
Hacker Techniques, Tools, and Incident Handling
Author Michael Gregg , Sean-Philip Oriyano
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about ....
Release Date 2010/10 -
Legal Issues in Information Security
Author Joanna Lyn Grama
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are n....
Release Date 2010/10 -
Security Strategies in Web Applications and Social Networking
Author Mike Harwood
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Web Applications and Social Networking provides a unique, in-depth look at how to secure mobile users as customer-facing information migrates fro....
Release Date 2010/10 -
Author Kurt W. MORTENSEN
Some people have the ability to enter a room and draw instant attention, effortlessly exuding charm, radiating energy and a commanding presence. That enviable quality is called charisma…and those who have it are better able to influence what gets done and....
Release Date 2010/10