Author Doug Barth , Evan GilmanThe perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar ....
Release Date 2017/07
Zero to $10 Million is a practical step by step guide that teaches entrepreneurs’ how to build a $10 million dollar technology business.It describes in detail how to create a great product, find a brilliant team, raise money from professional investors, and then scale the company globally.It is what....
Author Steven BoltXBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console — it streams movies, connects with social networking sites and chatrooms, transfer files, and more — it just may contain evide....
Release Date 2011/02
Workshop Mastery with Jimmy DiResta
Author John Baichtal , Jimmy DiRestaJimmy DiResta has made a name for himself with his inventiveness and workshop skills, creating dozens of projects for YouTube videos and television shows such as Hammered and Against the Grain on the DIY network. In Make: Workshop Mastery With Jimmy DiResta, Jimmy ....
Release Date 2016/10
Author Kim KerrWorkplace violence in all its forms is becoming more prevalent and pervasive every year. Workplace Violence: Planning for Prevention and Response gives a comprehensive account of the problem using a multi-faceted approach to the issues surrounding workplace violence....
Release Date 2010/05
Author Tara PowersCreate a space for a healthy work–life balanceStay connected with Slack, Zoom, and Microsoft TeamsMaintain productivity and stay healthy and saneWorking from home is the new normalWorking from home was already on the rise, but when COVID-19 hijacked our reality, it became....
Release Date 2020/08
Work Smarts: What CEOs Say You Need To Know to Get Ahead
Author Betty LiuAward-winning Bloomberg television host Betty Liu compiles the wisdom of the world's best CEOs into a fun, insightful, and practical guide for success.Betty Liu is famous the world over for asking the tough questions of today's most successful people—and for her u....
Release Date 2013/12
Wireless Reconnaissance in Penetration Testing
Author Chris Sanyk , Alex Hamerstone , Matthew NeelyIn many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetrat....
Release Date 2012/12
Wireless Network Security: A Beginner’s Guide
Author Tyler WrightsonSecurity Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and....
Release Date 2012/04
Windows Virus and Malware Troubleshooting
Author Mike Halsey , Andrew BettanyMake your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.Whatever version of Windows you're using, the threat of virus and malware infection is always a com....
Release Date 2017/03
Author Andrei MiroshnikovGo deep into Windows security tools to implement more robust protocols and processesWindows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Microsoft security p....
Release Date 2018/04
Windows Malware Analysis Essentials
Author Victor MarakMaster the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setAbout This BookSet the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malwareUnderstand ....
Release Date 2015/09
Author Scar de Courcier , Oleg SkulkinMaximize the power of Windows Forensics to perform highly effective forensic investigationsAbout This BookPrepare and perform investigations using powerful tools for Windows,Collect and validate evidence from suspects and computers and uncover clues that are otherw....
Release Date 2017/08
Windows Forensics and Incident Recovery
Author Harlan CarveyPraise for Windows Forensics and Incident Recovery"Windows Forensics and Incident Recovery doesn't just discuss forensics, it also includes tools for analysis and shows readers how to use them. I look forward to putting these tools through their paces, and I recomm....
Release Date 2004/07
Wiley CPAexcel Exam Review 2015 Study Guide (January): Business Environment and Concepts
Author O. Ray WhittingtonThe world's most effective CPA exam prep system - Business and Environmental Concepts moduleWiley CPAexcel Exam Review is the world's most trusted study guide for the Certified Public Accountant's exam - complete, comprehensive, and updated to align with the late....
Release Date 2014/12
Author Mark D. WolfingerIn an era where “buy and hold” investment strategies no longer work, investors desperately need portfolio protection. Fortunately, it’s available—in the form of options. In Why Trade Options? top trader and options instructor Mark D. Wolfinger shows how options can ....
Release Date 2012/01
Who Are the Bad Guys and What Do They Want?
Author Mike Barlow , Gregory FellRecent breaches at the Internal Revenue Service are a stark reminder that cyber crime is alive and well. According to Center for Strategic and International Studies, cyber crime and cyber espionage cost the global economy between $375 billion and $575 billion annua....
Release Date 2016/03
Author Joan C. Williams"I recommend a book by Professor Williams, it is really worth a read, it's called White Working Class." -- Vice President Joe Biden on Pod Save AmericaAn Amazon Best Business and Leadership book of 2017Around the world, populist movements are gaining traction amon....
Release Date 2017/05
White Space Is Not Your Enemy, 3rd Edition
Author Rebecca Hagen , Kim GolombiskyWhite Space Is Not Your Enemy is a practical graphic design and layout guide that introduces concepts and practices necessary for producing effective visual communication across a variety of formats—from web to print. Sections on Gestalt theory, color theory, and W....
Release Date 2017/02
White Space is Not Your Enemy, 2nd Edition
Author Rebecca Hagen , Kim GolombiskyDesigning a brochure or web site without an art background? Step away from the computer and read this breezy introduction to visual communications first. Written for non-designers, White Space is Not Your Enemy is a practical graphic design and layout text int....
Release Date 2013/03
Author Rebecca Hagen , Kim GolombiskyDesigning a brochure or web site without an art background? Step away from the computer and read this breezy introduction to visual communications first. Written for non-designers, White Space is Not Your Enemy is a practical graphic design and layout text introduci....
Release Date 2013/05
Where Does Social Security Fit Into Your Retirement?
Author Paul B. Brown , Frank ArmstrongThis Element is an excerpt from Save Your Retirement: What to Do If You Haven’t Saved Enough or If Your Investments Were Devastated by the Market Meltdown (9780137029006) by Frank Armstrong, III and Paul B. Brown. Available in print and digital formats.A clear-eyed ....
Release Date 2010/09
What's Wrong with Damn Near Everything!
Author Larry WingetThe Pitbull of Personal Development® Takes on Damn Near Everything!Larry Winget does not mince words, and in this latest addition to his straight-talking brand, one of the most iconic leaders of the personal development industry puts down in black and white, What'....
Release Date 2017/07
What Every Engineer Should Know About Cyber Security and Digital Forensics
Author Joanna F. DeFrancoMost organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology. Designed for the non-security professional, W....
Release Date 2013/10
Weirdos in the Workplace: The New Normal… Thriving in the Age of the Individual
Author John Putzier - M.S. , SPHR“The author has hit on something here; particularly the fact that it is high time we quit thinking that treating everyone the same is somehow fair. Like it or not, the realities uncovered in this book are just that...real! And if you plan to be a significant player....
Release Date 2004/07
Author Malcolm McDonaldThe world has changed. Today, every time you make a site live, you’re opening it up to attack.A first-time developer can easily be discouraged by the difficulties involved with properly securing a website. But have hope: an army of security researchers is out there discov....
Release Date 2020/06
Web Penetration Testing with Kali Linux - Third Edition
Author Juned Ahmed Ansari , Gilberto Najera-GutierrezBuild your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holesAbout This BookKnow how to set up your lab with Kali LinuxDiscover the core concepts of web penetration testin....
Release Date 2018/02
Web Penetration Testing with Kali Linux - Second Edition
Author Juned Ahmed AnsariBuild your defense against web attacks with Kali Linux 2.0About This BookGain a deep understanding of the flaws in web applications and exploit them in a practical mannerGet hands-on web application hacking experience with a range of tools in Kali Linux 2.0Develop ....
Release Date 2015/11
Web Penetration Testing with Kali Linux
Author Aamir Lakhani , Joseph MunizTesting web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit.Learn key reconnaissance concepts needed as a penetrati....
Release Date 2013/09