-
The Cybersecurity Manager's Guide
Author Todd Barnum
If you're a leader in Cybersecurity, then you know it often seems like no one cares about--or understands--information security. Infosec professionals struggle to integrate security into their companies. Most are under resourced. Most are at odds with their organization....
Release Date 2021/04 -
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. -
Author Joy R. Butler
If you actively use the internet to advance your business and professional endeavors, you are a cyber citizen and this book is for you. As a good cyber citizen, you want to stay legal online and protect your online interests. The Cyber Citizen’s Guide Th....
Release Date 2010/05 -
The Customer Revolution in Healthcare: Delivering Kinder, Smarter, Affordable Care for All
Author David W Johnson
Customer-centric, market-driven solutions for fixing America’s broken healthcare system—from one of the industry’s most innovative thought leaders. Healthcare accounts for nearly a fifth of the U.S. economy. Everyone agrees that the current system is broken and in ....
Release Date 2019/09 -
The CSSLP™ Prep Guide: Mastering the Certified Secure Software Lifecycle Professional
Author Alexander J. Fry , Ronald L. Krutz
The first test prep guide for the new ISC2 Certified Secure Software Lifecycle Professional examThe CSSLP (Certified Secure Software Lifecycle Professional) is a new certification that incorporates government standards and best practices for secure software developm....
Release Date 2009/08 -
Author Linda Frederiksen
Within most libraries in the United States today there is an information professional who has become the ‘go-to’ person for grasping and grappling with copyright questions. While not an attorney, this librarian has developed an awareness and understanding of copyri....
Release Date 2015/11 -
Author Mike Dulworth , Michael Dulworth
Networking is a critically important skill, but few people are aware of its power or know how to develop, maintain, and leverage networks over their lifetime. In The Connect Effect, Michael Dulworth reveals the surprising ways personal, professional, and virtua....
Release Date 2008/01 -
Author N. K. McCarthy
Based on proven, rock-solid computer incident response plansThe Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence. The book....
Release Date 2012/08 -
The Compliance Revolution: How Compliance Needs to Change to Survive
Author David Jackman
The Compliance Revolution—Practical, Powerful Changes for Strategic Organizational ValueCompliance is absolutely critical in creating a robust and resilient organization, one which is trusted by clients and contributes to market stability. Firms must approach compl....
Release Date 2015/08 -
The Complete Idiot's Guide to Getting Organized Fast-Track
Author Cynthia Ewer
In our materialistic, time-crunched society, lifestyles are compromised by disorganization and clutter. In a 2008 National Association of Professional Organizers survey, 65 percent of respondents noted that their household was at least moderately disorganized, 71 pe....
Release Date 2012/11 -
The Complete Idiot's Guide to Enhancing Your Social IQ
Author Gregory P. Korgeski
Simple steps to connecting with others. Now readers can raise their social intelligence quotient with a little self-Knowledge and practice. Beginning with a series of short quizzes that generate a personal social profile, this guide explains how readers can enhance....
Release Date 2008/12 -
The Complete Idiot's Guide to Business Law
Author Cara C. Putman
The only guide of its kind! Undergraduate college students working toward business degrees, MBA graduate students, and first year law students have one thing in common: they need to take courses in business law. Unlike cumbersome and expensive textbooks, The Comple....
Release Date 2009/05 -
The Complete Coding Interview Guide in Java
Author Anghel Leonard
Explore a wide variety of popular interview questions and learn various techniques for breaking down tricky bits of code and algorithms into manageable chunksKey FeaturesDiscover over 200 coding interview problems and their solutions to help you secure a job as a Java dev....
Release Date 2020/08 -
Author Russell Dean Vines , CISSP , CISM , Security + , CCNA , MCSE , MCNE , Ronald L. Krutz
This follow-on edition to The CISSP Prep Guide: Mastering CISSP and ISSEP offers value-add coverage not featured anywhere else! You'll prepare for passing CISSP with a revised review of each of the ten CISSP domains, updated to reflect current thinking/technology, ....
Release Date 2006/11 -
The CISM™ Prep Guide: Mastering the Five Domains of Information Security Management
Author Russell Dean Vines , Ronald L. Krutz
Prepares readers for the Certified Information Security Manager (CISM) exam, ISACA's new certification that launches in June 2003CISM is business-oriented and intended for the individual who must manage, design, oversee, and assess an enterprise's information secu....
Release Date 2003/05 -
The CERT® Oracle® Secure Coding Standard for Java™
Author David Svoboda , Dean F. Sutherland , Robert C. Seacord , Dhruv Mohindra , Fred Long
“In the Java world, security is not viewed as an add-on a feature. It is a pervasive way of thinking. Those who forget to think in a secure mindset end up in trouble. But just because the facilities are there doesn’t mean that security is assured automatically. A....
Release Date 2011/09 -
Author Randall F. Trzeciak , Andrew P. Moore , Dawn M. Cappelli
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade sec....
Release Date 2012/01 -
The CERT® C Secure Coding Standard
Author Robert C. Seacord
“I’m an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CER....
Release Date 2008/10 -
The Business Case For Network Security: Advocacy, Governance, And Roi
Author Warren Saxe , Catherine Paquet
Understand the total cost of ownership and return on investment for network security solutionsUnderstand what motivates hackers and how to classify threatsLearn how to recognize common vulnerabilities and common types of attacksExamine modern day security systems, d....
Release Date 2004/12 -
The Business Analyst as Strategist
Author Kathleen B. Hass
An organization's ability to achieve strategic goals through programs and supporting projects depends on its ability to establish a future vision, set strategic goals, select the most valuable projects, and then execute flawlessly. Organizational strategic al....
Release Date 2007/12 -
Author Michele Orru , Christian Frichot , Wade Alcorn
Hackers exploit browser vulnerabilities to attack deep within networksThe Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a ....
Release Date 2014/03 -
The Broadcast Century and Beyond, 4th Edition
Author Michael C Keith , Robert L Hilliard
The Broadcast Century and Beyond, 4th Edition, is a popular history of the most influential and innovative industry of the previous and current century. The story of broadcasting is told in a direct and informal style, blending personal insight and authoritative sch....
Release Date 2004/10 -
Author William Byers
In today's unpredictable and chaotic world, we look to science to provide certainty and answers--and often blame it when things go wrong. The Blind Spot reveals why our faith in scientific certainty is a dangerous illusion, and how only by embracing science's inhe....
Release Date 2011/03 -
The Best Damn IT Security Management Book Period
Author Robert McCrie , Susan Snedaker
The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues fa....
Release Date 2011/04 -
Author Josh Pauli
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system....
Release Date 2013/06 -
The Basics of Hacking and Penetration Testing, 2nd Edition
Author Patrick Engebretson
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the result....
Release Date 2013/06