-
Author Andrew Honig , Michael Sikorski
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software t....
Release Date 2012/02 -
Accountability: Angst, Awareness, Action
Author Jay P. Desai
This book was written to increase the public understanding of 'accountability'. The author constructs a three-dimensional lens with which he examines the mechanisms that hold our governance institutions accountable. Desai explains why a burst of governance reforms....
Release Date 2012/02 -
Foundation Version Control for Web Developers
Author Ian Oxley , Chris Kemper
Foundation Version Control for Web Developers explains how version control works, what you can do with it and how. Using a friendly and accessible tone, you will learn how to use the three leading version control systems—Subversion, Git and Mercurial—on multiple ope....
Release Date 2012/03 -
Linux Pocket Guide, 2nd Edition
Author Daniel J. Barrett
If you use Linux in your day-to-day work, this popular pocket guide is the perfect on-the-job reference. The second edition has expanded from Fedora-only coverage to distro-neutral, with practical information on a wider range of commands requested by readers. For no....
Release Date 2012/03 -
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2nd Edition
Author Blunden
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopti....
Release Date 2012/03 -
Wireless Network Security: A Beginner’s Guide
Author Tyler Wrightson
Security Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and....
Release Date 2012/04 -
Cyber Security Policy Guidebook
Author Joseph Weiss , Jeffrey Schmidt , Marcus H. Sachs , Paul Rohmeyer , Jason Healey , Jen
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers ....
Release Date 2012/04 -
Predictive Control of Power Converters and Electrical Drives
Author Patricio Cortes , Jose Rodriguez
Describes the general principles and current research into Model Predictive Control (MPC); the most up-to-date control method for power converters and drivesThe book starts with an introduction to the subject before the first chapter on classical control methods for....
Release Date 2012/04 -
Hands-On Ethical Hacking and Network Defense
Author James E. Corley , Kent Backman , Michael T. Simpson
It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related ....
Release Date 2012/04 -
Applying Social Tools to Learning
Author Dave Wilkins
With social learning, the whole company is part of the learning and development team. This Infoline will show you how to strategically design effective and agile social learning strategies that address the unique needs of various learning initiatives. Learn about th....
Release Date 2012/04 -
The Basics of Digital Forensics
Author John Sammons
The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to ....
Release Date 2012/04 -
OHSAS 18001 Step by Step: A Practical Guide
Author Naeem Sadiq
An essential guide to OHSAS 18001 We say 'take care' as we wave our loved ones goodbye in the morning, but how often is this message taken into the workplace? In this easy-to-understand and timely pocket guide, Naeem Sadiq, examines the Understanda as it gears ....
Release Date 2012/04 -
Microsoft Windows Identity Foundation Cookbook
Author Sandeep Chanda
Over 40 recipes to master claims-based identity and access control in .NET applications using Windows Identity Foundation, Active Directory Federation Services, and AppFabric Access Control ServicesGain a firm understanding of Microsoft’s Identity and Access Control....
Release Date 2012/04 -
Architecting Mobile Solutions for the Enterprise
Author Dino Esposito
Your guide to planning and executing a complete mobile web strategyRevisit your approach to the mobile web—and deliver effective solutions that reach customers and clients on a variety of mobile devices. In this practical guide, web development luminary Dino Esposit....
Release Date 2012/05 -
CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105, 3rd Edition
Author David A. Westcott , David D. Coleman
Newly updated edition of this top-selling CWNA study guideSybex is the official publisher for CWNP, Inc., the organization behind the the CWNA certification. The new edition of Sybex's top-selling CWNA Study Guide covers the latest CWNA Exam, PW0-105. If you're pr....
Release Date 2012/05 -
Cyber Forensics: From Data to Digital Evidence
Author Albert J. Marcella , Frederic Guillossou
An explanation of the basic principles of dataThis book explains the basic principles of data as building blocks of electronic evidential matter, which are used in a cyber forensics investigations. The entire text is written with no reference to a particular operati....
Release Date 2012/05 -
Cyber Conflict: Competing National Perspectives
Author Daniel Ventre
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace cou....
Release Date 2012/05 -
Malware Forensics Field Guide for Windows Systems
Author James M. Aquilina , Eoghan Casey , Cameron H. Malin
Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital ....
Release Date 2012/05 -
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Author Lee Allen
Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook.Learn how to perform an efficient, organized, and effective penetration test from start to finishGain hands-on penetration t....
Release Date 2012/05 -
Author James Forsythe , Burton Goldberg
Cancer rates continue to skyrocket, and the overall survival rate for Stage IV cancer patients in the United States is a grim 2.1 percent. Clearly, the extensive use of expensive, sometimes ineffective toxins in conventional oncology protocols is a failing strategy.....
Release Date 2012/05 -
Network Forensics: Tracking Hackers through Cyberspace
Author Jonathan Ham , Sherri Davidoff
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadm....
Release Date 2012/06 -
Mastering Windows Network Forensics and Investigation, 2nd Edition
Author Scott Pearson , Ryan Johnson , Steve Bunting , Steven Anson
An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personn....
Release Date 2012/06 -
Sage 50 Accounts For Dummies® 2nd Edition
Author Jane Kelly , ACMA
Get to grips with Sage 50 Accounts in simple stepsThis comprehensive guide walks you through every aspect of setting up and using Sage 50 Accounts, from installing the software to running VAT returns and producing monthly and yearly accounts. Inside you'll discover....
Release Date 2012/06 -
Penetration Testing: Protecting Networks and Systems
Author Kevin M. Henry
Preparation for the Certified Penetration Testing Engineer (CPTE) examination Penetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack. The Certifie....
Release Date 2012/06 -
Metasploit Penetration Testing Cookbook
Author Abhinav Singh
Over 80 recipes to master the most widely used penetration testing framework with this book and ebook.More than 80 recipes/practicaltasks that will escalate the reader’s knowledge from beginner to an advanced level Special focus on the latest operating systems, expl....
Release Date 2012/06 -
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Author Gregory Carpenter , Sean Bodmer , Jade Jones , Jeff Jones , Dr. Max Kilger
A complete guide to understanding and fighting advanced persistent threats—today's most destructive risk to enterprise securityReverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize the....
Release Date 2012/07 -
Continuity Supervisor, 4th Edition
Author Avril Rowlands
The Continuity Supervisor is a practical guide to the basics of continuity, designed to be of use both to the newcomer and those more experienced. Formerly titled 'The Continuity Handbook: a guide for single-camera shooting, this new edition covers the latest....
Release Date 2012/07 -
Author David D. Busch
DAVID BUSCH'S NIKON D3200 GUIDE TO DIGITAL SLR PHOTOGRAPHY is your onestop resource and reference for the Nikon D3200, the latest entrylevel DSLR in the Nikon product line, featuring a 16.2 megapixel sensor, full HDTV video, and ISO up to 12,800. With this book in ....
Release Date 2012/07 -
The Future of Boards: Meeting the Governance Challenges of the Twenty-First Century
Author Jay Lorsch
Edited by Harvard Business School professor Jay W. Lorsch, the preeminent authority on corporate boards, this book gathers the leading voices from business and academia to address the challenges of governance in the 21st century.We are at a crucial juncture in the e....
Release Date 2012/07 -
Author Michael E Cohen
Join expert Mac writer Michael E. Cohen as he helps you enjoy the power of TextExpander 3, the award-winning text expansion utility from Smile. If you're a TextExpander newbie, you'll learn how to create "snippets" of text (like your address) that you can insert i....
Release Date 2012/07