-
How to Do Everything: Genealogy, Fourth Edition
Author George G. Morgan
Discover your genealogy using the latest methods Thoroughly revised to cover new tools, techniques, and data, How to Do Everything: Genealogy, Fourth Edition uniquely addresses all the major genealogical record types and explains traditional and digi....
Release Date 2015/02 -
Quicken 2015 The Official Guide, 3rd Edition
Author Bobbi Sandberg
The ONLY official guide to the 2015 release of the #1 bestselling personal finance software“Intuit-approved and loaded with secrets, this book provides you with recipes for financial success.” –Scott Cook, Co-Founder, Intuit, Inc.Quicken 2015: The Official Guide sho....
Release Date 2014/11 -
Incident Response & Computer Forensics, 2nd Ed.
Author Chris Prosise , Kevin Mandia
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book s....
Release Date 2003/07 -
Managing Legal and Ethical Principles Revised Edition
Author Elearn
Stuck for ideas, inspiration or just want to work differently? Management Extra brings all the best management thinking together in one package. The books are practical and well structured to provide an in depth treatment of these management topics. Titles in ....
Release Date 2009/11 -
Building a Digital Forensic Laboratory
Author Craig Valli , Andrew Jones
The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the ....
Release Date 2011/04 -
Author Kim Kerr
Workplace violence in all its forms is becoming more prevalent and pervasive every year. Workplace Violence: Planning for Prevention and Response gives a comprehensive account of the problem using a multi-faceted approach to the issues surrounding workplace violence....
Release Date 2010/05 -
Author Morgan Jones
Valve Amplifiers has been recognized as the most comprehensive guide to valve amplifier design, analysis, modification and maintenance. It provides a detailed presentation of the rudiments of electronics and valve design for engineers and non-experts. The source als....
Release Date 2011/10 -
Particle Technology and Engineering
Author Chuan-Yu Wu , Jonathan P.K. Seville
Particle Technology and Engineering presents the basic knowledge and fundamental concepts that are needed by engineers dealing with particles and powders. The book provides a comprehensive reference and introduction to the topic, ranging from single particle charac....
Release Date 2016/05 -
Being a Solo Librarian in Healthcare
Author Elizabeth C Burns
This book brings to light the current job responsibilities of the healthcare librarian, but at the same time reveals a dichotomy. In theory, advances in healthcare research promise better care and improved safety for patients. In practice, there are barriers that un....
Release Date 2015/05 -
Law Librarianship in Academic Libraries
Author Yemisi Dina
In the last two decades, advancement in technology has transformed every aspect of librarianship. Law Librarianship in Academic Law Libraries discusses issues and model practices in academic law libraries. This text will help librarians and library school students u....
Release Date 2015/04 -
Author Linda Frederiksen
Within most libraries in the United States today there is an information professional who has become the ‘go-to’ person for grasping and grappling with copyright questions. While not an attorney, this librarian has developed an awareness and understanding of copyri....
Release Date 2015/11 -
Author Mary M. Somerville
By fostering principles of systems thinking and informed learning though an inclusive, participatory design process that advances information exchange, reflective dialogue, and knowledge creation, the Informed Systems Approach promotes conceptual change in workplace....
Release Date 2015/07 -
Author George Varghese
In designing a network device, you make dozens of decisions that affect the speed with which it will perform—sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other d....
Release Date 2004/12 -
Author Pini Gurfil
In recent years, an unprecedented interest in novel and revolutionary space missions has risen out of the advanced NASA and ESA programs. Astrophysicists, astronomers, space systems engineers, mathematicians and scientists have been cooperating to implement novel an....
Release Date 2006/10 -
Handbook of Digital Forensics and Investigation
Author Eoghan Casey
This completely revised reference work will concentrate on providing specific practical information in a well organized format. Each chapter will have a consistent structure, covering similar aspects of different systems when appropriate. In order to provide reade....
Release Date 2009/11 -
Disappearing Cryptography, 3rd Edition
Author Peter Wayner
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integr....
Release Date 2009/06 -
Author Thomas L. Norman
Access Control Systems are difficult to learn and even harder to master due to the different ways in which manufacturers approach the subject and the myriad complications associated with doors, door frames, hardware, and electrified locks. Electronic Access Control ....
Release Date 2011/10 -
Corrosion Control for Offshore Structures
Author Ramesh Singh
A variable game changer for those companies operating in hostile, corrosive marine environments, Corrosion Control for Offshore Structures provides critical corrosion control tips and techniques that will prolong structural life while saving millions in cost. In thi....
Release Date 2014/08 -
Author Jason Andress , Steve Winterfeld
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive....
Release Date 2012/12 -
Author Andrew Bindner , James Broad
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you thr....
Release Date 2013/12 -
Author Andrew Ruef , Jana Shakarian , Paulo Shakarian
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only fr....
Release Date 2013/05 -
Author Art Bowker , Todd G. Shipley
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for inves....
Release Date 2013/11 -
Identity and Access Management
Author Ertem Osmanoglu
Identity and Access Management: Business Performance Through Connected Intelligenceprovides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide i....
Release Date 2013/11 -
Intelligent Coatings for Corrosion Control
Author James Rawlins , Lloyd Hihara , Atul Tiwari
Intelligent Coatings for Corrosion Control covers the most current and comprehensive information on the emerging field of intelligent coatings. The book begins with a fundamental discussion of corrosion and corrosion protection through coatings, setting the stage fo....
Release Date 2014/10 -
Simple Steps to Data Encryption
Author Peter Loshin
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to b....
Release Date 2013/04 -
The Basics of Hacking and Penetration Testing, 2nd Edition
Author Patrick Engebretson
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the result....
Release Date 2013/06 -
Author Josh Pauli
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system....
Release Date 2013/06 -
Author Steve Winterfeld , Jason Andress
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information....
Release Date 2013/10 -
Cyber Security and IT Infrastructure Protection
Author John R. Vacca
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It ....
Release Date 2013/08