-
Mastering pfSense - Second Edition
Author David Zientara
Install and configure a pfSense router/firewall, and become a pfSense expert in the process.About This BookYou can always do more to secure your software ? so extend and customize your pfSense firewallBuild a high availability security system that's fault-tolerant....
Release Date 2018/05 -
Digital Forensics with Kali Linux - Second Edition
Author Shiva V. N. Parasram
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety o....
Release Date 2020/04 -
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Author Aviel D. Rubin , Steven M. Bellovin , William R. Cheswick
The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing a generation of Internet security experts how to think about threats and solutions. This completely updated and expanded second edition defines the sec....
Release Date 2003/02 -
All-in-One CISA® Certified Information Systems Auditor: Exam Guide, Second Edition
Author Peter Gregory
"All-in-One is All You Need"The new edition of this trusted resource offers complete, up-to-date coverage of all the material included on the latest release of the Certified Information Systems Auditor exam. Written by an IT security and audit expert, CISA Certified....
Release Date 2011/08 -
Clients, Clients, and More Clients
Author Larina Kase
TURN EVERY BUSINESS CONNECTION INTO A PAYING CLIENTWith a Foreword by Michael Port, bestselling author of Book Yourself SolidClients, Clients, and More Clients arms you with powerful tools from the field of psychology for building every business connection into the ....
Release Date 2011/09 -
Author N. K. McCarthy
Based on proven, rock-solid computer incident response plansThe Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence. The book....
Release Date 2012/08 -
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition
Author Stephen Sims , Ryan Linn , Branko Spasojevic , Jonathan Ness , Chris Eagle , Allen Ha
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's....
Release Date 2015/01 -
Managing Legal and Ethical Principles Revised Edition
Author Elearn
Stuck for ideas, inspiration or just want to work differently? Management Extra brings all the best management thinking together in one package. The books are practical and well structured to provide an in depth treatment of these management topics. Titles in ....
Release Date 2009/11 -
Microcontroller Based Applied Digital Control
Author Dogan Ibrahim
Combines the theory and the practice of applied digital controlThis book presents the theory and application of microcontroller based automatic control systems. Microcontrollers are single-chip computers which can be used to control real-time systems. Low-cost, sing....
Release Date 2006/04 -
Mastering IDEAScript: The Definitive Guide, with Website
Author John Paul Mueller
Improve your audit results and extend your capabilities with Mastering IDEAScript: The Definitive GuideRun audit programs and data analysis projects with ease. Create a local automated audit system. Meet current audit standards. Do it all with Mastering IDEAScript, ....
Release Date 2011/04 -
Managing Complexity of Information Systems: The Value of Simplicity
Author Mederic Morel , Pirmin P. Lemberger
This book is about complexity in Information Systems (IS). The subject is addressed from both conceptual and applied perspectives. Concepts are drawn from information theory, industrial design and software engineering. Its content capitalizes on experiences gathered....
Release Date 2012/01 -
Author Jason A. Scharfman
Develop and manage a private equity compliance program Compliance has become one of the fastest-growing areas in the private equity (PE) space. Mirroring trends from the hedge fund industry, recent surveys indicate that PE managers rank compliance as the single mos....
Release Date 2018/09 -
Joint Ventures Involving Tax-Exempt Organizations, 4th Edition
Author Michael I. Sanders
Stay up to date on all relevant regulatory and legislative changes, as well as leading case law, in a complicated area of law In the 2021 Cumulative Supplement to the 4th edition of Joint Ventures Involving Tax-Exempt Organizations, a renowned team of authors delivers the latest updates and developm....
Release Date 2021/12 -
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition, 4th Edition
Author Adam Gordon
As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. ....
Release Date 2015/09 -
Author Konstantin Kerekovski , Bal Mukund Sharma , Krishna Kumar K M , Nassyam Basha , YV R
Work with Oracle database’s high-availability and disaster-management technologies. This book covers all the Oracle high-availability technologies in one place and also discusses how you configure them in engineered systems and cloud services.You will see that when....
Release Date 2019/05 -
Steal This Computer Book 4.0, 4th Edition
Author Wallace Wang
This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters discussing the hacke....
Release Date 2006/05 -
Kali Linux Wireless Penetration Testing Essentials
Author Marco Alamanni
Plan and execute penetration tests on wireless networks with the Kali Linux distributionIn DetailKali Linux is the most popular distribution dedicated to penetration testing that includes a set of free, open source tools.This book introduces you to wireless penetrat....
Release Date 2015/07 -
Author Sunny Wear
Get hands-on experience in using Burp Suite to execute attacks and perform web assessmentsKey FeaturesExplore the tools in Burp Suite to meet your web infrastructure security demands Configure Burp to fine-tune the suite of tools specific to the target Use Burp ext....
Release Date 2018/09 -
Kali Linux – Assuring Security by Penetration Testing
Author Shakeel Ali , Lee Allen , Tedi Heriyanto
With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals.In DetailKali Linux is a comprehe....
Release Date 2014/04 -
Author Dr. Michael J. Urick
Many assumed characteristics of generational groupings are actually “myths,” meaning that generational stereotypes are not accurate across all members of a generation.This book explores the Generation Myth by highlighting the complexity of the “generation” concept ....
Release Date 2019/02 -
Author Michael J. Panzner
To survive in the jungle, you must recognize thesubtle nuances that signal danger and opportunity. That's how it is inthe stock market, too. But the market's radically changed: followyesterday's signals and you'll get eaten alive. The New Laws of theStock Market....
Release Date 2004/06 -
Author Eric Cole
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are ver....
Release Date 2001/08 -
Author Russ Hepworth-Sawyer , Mark Cousins
Guiding you through the history and emergence of modern mastering techniques, then providing practical hints and tips on how to use them in your set up, Practical Mastering is the book for anyone interested in tackling this elusive art form. Providing you with sold ....
Release Date 2013/08 -
Microsoft® Mobile Development Handbook
Author Peter Foot , Daniel Moth , Andy Wigley
Learn the essentials for developing mobile applications for any Windows-based mobile device. Focusing on proven techniques and practices, this guide addresses the real-world needs of experienced Microsoft Windows® mobile developers. Users are growing increasingly d....
Release Date 2007/05 -
CompTIA Security+ SY0-201 Practice Questions Exam Cram, Second Edition
Author Diane Barrett
800+ up-to-the-minute CompTIA Security+ practice questions: outstanding preparation for mastering every Security+ exam objectiveThe perfect complement to every CompTIA Security+ study resourceProvides all questions on both the book and CD, with detailed explanations....
Release Date 2009/11 -
Author Michael Gregg
CISA Exam PrepCertified Information Systems AuditorMichael GreggYour Complete Certification Solution!The Smart Way to Study™In This Book You’ll Learn How To:Approach the IS audit process from ISACA’s view of IS auditing best practicesRelate and apply information sec....
Release Date 2007/05 -
Work Smarts: What CEOs Say You Need To Know to Get Ahead
Author Betty Liu
Award-winning Bloomberg television host Betty Liu compiles the wisdom of the world's best CEOs into a fun, insightful, and practical guide for success.Betty Liu is famous the world over for asking the tough questions of today's most successful people—and for her u....
Release Date 2013/12 -
The Handbook of Board Governance
Author John Fraser , Richard Leblanc
Build a more effective board with insight from the forefront of corporate governanceThe Handbook of Board Governance provides comprehensive, expert-led coverage of all aspects of corporate governance for public, nonprofit, and private boards. Written by collaborati....
Release Date 2016/05 -
Author Samuel F. Elder , Jennifer H. Elder
Protect your company’s finances in the event of a disaster In the face of an environmental or man-made disaster, it’s imperative to have a contingency plan that’s mapped out your corporation’s strategy to minimize the impact on the daily functions or life of the co....
Release Date 2019/04 -
How Open Source Ate Software: Understand the Open Source Movement and So Much More
Author Gordon Haff
Learn how free software became open source and how you can sell open source software. This book provides a historical context of how open source has thoroughly transformed how we write software, how we cooperate, how we communicate, how we organize, and, ultimately....
Release Date 2018/08