-
Author Leslie S. Hiraoka
He covers the anti-trust case against Microsoft; the successes of eBay, Amazon, Yahoo, and Google; road-kills along the information highway such as the forgotten eToys; as well as the Enron implosion and other corporate scandals. After tracing this amazing story he....
Release Date 2017/03 -
Author Douglas Spotted Eagle
Carefully detailed screen shots and step-by-step directions illustrate how to use Encore DVD software in a time-efficient way. Readers learn to harness the full scope of Encore DVD's functions, including importing and organizing content to build the DVD, using....
Release Date 2013/04 -
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition
Author David Huca - CCIE No. 4594
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily config....
Release Date 2007/08 -
Author Dylan Shields
Running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS. In AWS Security you’ll learn how to: Securely grant access to AWS resources to coworkers and customersDevelop policies....
Release Date 2022/09 -
Change Manager - Careers in IT service management
Author Tracey Torble
Change management is about the control of all changes that have an effect on the IT services and hence, the business of an organisation. This practical book describes the change manager role in depth including purpose, typical responsibilities and required skills. ....
Release Date 2019/07 -
Author Keanon J. Alderson
This book presents research-based information to provide the reader a deeper understanding of the complex nature of family owned businesses, their problems and challenges, and the unique governance structures and mechanisms that have been developed to properly guid....
Release Date 2019/04 -
Network Security Hacks, 2nd Edition
Author Andrew Lockhart
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alar....
Release Date 2006/10 -
Author J. Stuart Bunderson , Bret Sanner
Research on social species shows that hierarchies are important for group functioning. Human beings also have a tendency to think and act hierarchically. In fact, hierarchies — distinct differences in group members' power and status — can be found in v....
Release Date 2018/01 -
CCNP Security Firewall 642-617 Quick Reference
Author Andrew Mason
As a final exam preparation tool, the CCNP Security Firewall 642-617 Quick Reference provides a concise review of all objectives on the new CCNP Security Firewall exam (642-617). This eBook provides you with detailed, graphical-based information, highlighting only t....
Release Date 2011/01 -
The Droid Pocket Guide: Ginormous knowledge, pocket-sized, Second Edition
Author Jason D. O’Grady
Here is your essential companion to the Android-powered Droid smartphone. The Droid Pocket Guide, Second Edition, steers you through how to:Set up and quickly start using your Droid smartphone.Make and receive calls and text messages.Send email and synchronize your ....
Release Date 2011/03 -
Data Breaches: Crisis and Opportunity
Author Sherri Davidoff
Protect Your Organization Against Massive Data Breaches and Their ConsequencesData breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines ....
Release Date 2019/10 -
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Author David Both
Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.This book....
Release Date 2019/12 -
Author Hillary Sanders , Joshua Saxe
"Security has become a ""big data"" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, ....
Release Date 2018/09 -
Information Security Risk Management for ISO 27001/ISO 27002, third edition
Author Alan Calder , Steve Watkins
Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework f....
Release Date 2019/08 -
CEH® Certified Ethical Hacker Study Guide
Author Kimberly Graves
Prepare for the new version of CEH certification with this advanced guideOnce you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it'....
Release Date 2010/04 -
Author Raymond Blockmon
Master CEH v9 and identify your weak spotsCEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can....
Release Date 2016/05 -
Google Hacking for Penetration Testers
Author Justin Brown , Bill Gardner , Johnny Long
This book helps people find sensitive information on the Web.Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google’s search capabilities are so powerful, they sometime....
Release Date 2011/04 -
Metasploit Revealed: Secrets of the Expert Pentester
Author Nipun Jaswal , Sagar Rahalkar
Exploit the secrets of Metasploit to master the art of penetration testing.About This BookDiscover techniques to integrate Metasploit with the industry's leading toolsCarry out penetration testing in highly-secured environments with Metasploit and acquire skills t....
Release Date 2017/12 -
Network Vulnerability Assessment
Author Sagar Rahalkar
Build a network security threat model with this comprehensive learning guideKey FeaturesDevelop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastr....
Release Date 2018/08 -
Cyber Warfare - Truth, Tactics, and Strategies
Author Dr. Chase Cunningham , Gregory J. Touhill
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.Key FeaturesDefine and determine a cyber-defence strategy based on current and past ....
Release Date 2020/02 -
Author Department Delhi Department of English University of Delhi
The Individual and Society: Essays, Stories and Poems is prescribed for the BA English (Discipline) course 'The Individual and Society', the concurrent inter-disciplinary course of the BA Honours programme, and the B.Com Honours Programme. The anthology consists o....
Release Date 2005/08 -
Fibre Channel for Mass Storage
Author Ralph H. Thornburgh
1022B-8Master Fibre Channel, the next-generation standard for enterprise storage!With Fibre Channel, you can suddenly scale your storage systems from gigabytes to terabytes, and improve performance at the same time -- all without disrupting systems, networks, or ap....
Release Date 1999/04 -
Author Tom Clark
Designing Storage Area Networks, Second Edition, succinctly captures the key technologies that are driving the storage networking industry. Tom Clark's works are helping to educate the IT community to the benefits and challenges of shared storage and are recommende....
Release Date 2003/03 -
Designing an IAM Framework with Oracle Identity and Access Management Suite
Author Scheidel Jeff
Develop and Implement an End-to-End IAM Solution Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management....
Release Date 2010/07 -
CISSP Practice Exams, Third Edition, 3rd Edition
Author Shon Harris
Don’t Let the Real Test Be Your First Test!Fully updated throughout and featuring new question types, this self-study tool contains more than 1250 realistic practice exam questions covering all 10 CISSP exam domains developed by the International Information Systems....
Release Date 2015/03 -
Legal Issues in Information Security
Author Joanna Lyn Grama
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are n....
Release Date 2010/10 -
Environmental Considerations Associated with Hydraulic Fracturing Operations
Author Stephen M. Testa , James A. Jacobs
A guide to environmental and communication issues related to fracking and the best approach to protect communities Environmental Considerations Associated with Hydraulic Fracturing Operations offers a much-needed resource that explores the complex challenges of fra....
Release Date 2019/04 -
CompTIA Security+ Review Guide, 4th Edition
Author James M. Stewart
Consolidate your knowledge base with critical Security+ reviewCompTIA Security+ Review Guide, Fourth Edition, is the smart candidate's secret weapon for passing Exam SY0-501 with flying colors. You've worked through your study guide, but are you sure you're prep....
Release Date 2017/12 -
Tribe of Hackers Security Leaders
Author Marcus J. Carey , Jennifer Jin
Tribal Knowledge from the Best in Cybersecurity LeadershipThe Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential securit....
Release Date 2020/03 -
Author George Finney , John Kindervag
Implement Zero Trust initiatives efficiently and effectivelyIn Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Pr....
Release Date 2022/10