-
Digital Forensics Trial Graphics
Author Lars Daniel , John Sammons
Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to laypeople (i.e., juries, judges, etc.). The book includes professional quality illustrations of technolog....
Release Date 2017/03 -
Author Subir Varma
Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms.The field of congestion control has seen....
Release Date 2015/08 -
Integrating Emergency Management and Disaster Behavioral Health
Author Ronald Sherman , Brian Flynn
Integrating Emergency Management and Disaster Behavioral Health identifies the most critical areas of integration between the profession of emergency management and the specialty of disaster behavioral health, providing perspectives from both of these critical area....
Release Date 2017/01 -
Shared Memory Application Programming
Author Victor Alessandrini
Shared Memory Application Programming presents the key concepts and applications of parallel programming, in an accessible and engaging style applicable to developers across many domains. Multithreaded programming is today a core technology, at the basis of all sof....
Release Date 2015/11 -
Handbook of System Safety and Security
Author Edward Griffor
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption o....
Release Date 2016/10 -
Author Zhaoyu Pian , Xiangping Meng
Intelligent Coordinated Control of Complex Uncertain Systems for Power Distribution and Network Reliability discusses the important topics revolving around the control of complex uncertain systems using the intelligent coordination control mechanism, a topic ....
Release Date 2015/11 -
Author Jayson E Street
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the worl....
Release Date 2015/07 -
Implementing Digital Forensic Readiness
Author Jason Sachowski
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organizati....
Release Date 2016/02 -
How to Become an International Disaster Volunteer
Author Michael Noone
How to Become an International Disaster Volunteer discusses the immense value an experienced water systems engineer, trauma surgeon, or communications specialist could bring to a disaster stricken community, while also explaining how their professional educations d....
Release Date 2017/02 -
Author John Sammons
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad rang....
Release Date 2015/12 -
Indoor Navigation Strategies for Aerial Autonomous Systems
Author Pedro Garcia Gil , Laura Elena Munoz Hernandez , Pedro Castillo-Garcia
Indoor Navigation Strategies for Aerial Autonomous Systems presents the necessary and sufficient theoretical basis for those interested in working in unmanned aerial vehicles, providing three different approaches to mathematically represent the dynamics of an aeria....
Release Date 2016/11 -
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Author Ali Dehghantanha , Kim-Kwang Raymond Choo
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners an....
Release Date 2016/10 -
Coding for Penetration Testers, 2nd Edition
Author Ryan Linn , Jason Andress
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool....
Release Date 2016/09 -
Estimation and Control of Large-Scale Networked Systems
Author Tao Li , Keyou You , Tong Zhou
Estimation and Control of Large Scale Networked Systems is the first book that systematically summarizes results on large-scale networked systems. In addition, the book also summarizes the most recent results on structure identification of a networked system, attac....
Release Date 2018/06 -
Executing Windows Command Line Investigations
Author Rosanne Pelli , Joshua Bartolomie , Chet Hosmer
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident resp....
Release Date 2016/06 -
Author Araceli Treu Gomes , Ira Winkler
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book....
Release Date 2016/11 -
Entrepreneurship in the Gulf Cooperation Council
Author Alexandrina Maria Pauceanu
Entrepreneurship in the Gulf Cooperation Council: Entrepreneurship in the Gulf Cooperation Council promotes a practical approach to starting businesses, and is useful not only for students, but also to anyone seeking practical insights on the essential aspects of e....
Release Date 2016/08 -
Eleventh Hour CISSP®, 3rd Edition
Author Joshua Feldman , Seth Misenar , Eric Conrad
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presente....
Release Date 2016/09 -
Solar Heating and Cooling Systems
Author Calin Sebarchievici , Ioan Sarbu
Solar Heating and Cooling Systems: Fundamentals, Experiments and Applications provides comprehensive coverage of this modern energy issue from both a scientific and technical level that is based on original research and the synthesis of consistent bibliographic mat....
Release Date 2016/10 -
Assemble the Social Web with zembly
Author Chris Webster , Todd Fast , Paul Anderson , Gail Anderson
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More! With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and....
Release Date 2008/12 -
Author Robert Morgan , Jean-Louis Bravard
A focused, implementation-orientated, executive-level book on outsourcing by two globally known practitioners.The outsourcing market is booming, the total outsourcing market in EMA forecasts a $59 billion dollar growth between 2004 and 2007.Fills a fills a major gap....
Release Date 2009/01 -
Author Jason D. O’Grady
In this handy new Pocket Guide, mobile device expert Jason O'Grady reveals the secrets to using the DROID. He covers everything from how to make phone calls, send text messages and email to synching data with your Google account. In addition he covers how to surf ....
Release Date 2010/03 -
Business and Competitive Analysis: Effective Application of New and Classic Methods
Author Babette E. Bensoussan , Craig S. Fleisher
“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.” --Bill Fiora, Partner and Founder, Outward Insights “All practicing managers and bu....
Release Date 2007/02 -
A Brief Look at Some Businesses Based on Shared Social Experience
Author Rawn Shah
This Element is an excerpt from Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs (9780132357791) by Rawn Shah. Available in print and digital formats.¿Lessons from some of today’s most innovative social businesses: last.fm, Li....
Release Date 2010/04 -
Author Jeff Carlson
Quickly master all the features and functions of the iPad with this handy well-crafted pocket guide. Versatile, portable, powerful, ergonomically and functionally designed, the iPad is the perfect companion for digital media. With photos, music, movies, e-mail, and ....
Release Date 2010/05 -
A Short Overview of Social Networks and Their Uses
Author Juliette Powell
This Element is an excerpt from 33 Million People in the Room: How to Create, Influence, and Run a Successful Business with Social Networking (9780137154357) by Juliette Powell. Available in print and digital formats.Profiling the world of social networks: what you ....
Release Date 2010/05 -
Dealing with a Lay Off: What to Expect When You Are No Longer Expected
Author Martha I. Finney
This Element is an excerpt from Rebound: A Proven Plan for Starting Over After Job Loss (ISBN: 9780137021147) by Martha Finney. Available in print and digital formats.Get your head and heart together after you’re laid off: what you’ll feel and how to handle it.You’v....
Release Date 2010/02 -
Corporate Governance Matters: A Closer Look at Organizational Choices and Their Consequences
Author Brian Tayan , David Larcker
Corporate Governance Matters gives corporate board members, officers, directors, and other stakeholders the full spectrum of knowledge they need to implement and sustain superior governance. Authored by two leading experts, this comprehensive reference thoroughly ad....
Release Date 2011/04 -
Wealth: Grow It, Protect It, Spend It, and Share It
Author Stuart E. Lucas
Never has it been more important to read Wealth: Grow It, Protect It, Spend It, and Share It. More of us have created more wealth today than ever before; managing our retirement assets is increasingly our own responsibility; and America is bracing for the largest ....
Release Date 2006/02 -
SOA Governance: Governing Shared Services On-Premise and in the Cloud
Author Filippos Santas , Chris Venable , Andre Tost , Leo Shuster , Robert Schneider , Rober
“Accenture sees this book as a milestone that will support the rationale behind selling and delivering SOA governance projects around the world.”--Dr. Matthias Ziegler, Accenture / Dr. Jure Zakotnik, Accenture / Thomas M. Michelbach, Accenture“We are using this book....
Release Date 2011/04