-
The Long-Tail Strategy of IT Outsourcing
Author Ravi Aron , Julia Kotlarsky , Ilan Oshri , Kunsoo Han , Vijay Gurbaxani , Rudy Hirsch
Today’s rapid technological changes have transformed the role of global IT outsourcing in companies’ strategies. Traditionally viewed as a cost-saving measure, IT outsourcing is also increasingly being leveraged as a strategic tool for acquiring cutting....
Release Date 2016/01 -
Warding Off the Threat of Disruption
Author Joshua S. Gans , Daniel Cohen
In a fast-changing digital landscape, companies shouldn't wait too long to reconfigure their offerings — but they also should be wary of moving to an untested technology too soon. Monitoring trends in related industries and identifying high-potential startup....
Release Date 2016/01 -
The Trouble With Corporate Compliance Programs
Author Maurice E. Stucke , David Wasieleski , John Dienhart , Sean J. Griffith , Tom R. Tyl
Multinational corporations spend millions of dollars per year on compliance. In highly regulated industries, such as health care and finance, large companies spend much more, sometimes hiring hundreds or even thousands of compliance officers at a time. There is oft....
Release Date 2017/10 -
Author J. Stuart Bunderson , Bret Sanner
Research on social species shows that hierarchies are important for group functioning. Human beings also have a tendency to think and act hierarchically. In fact, hierarchies — distinct differences in group members' power and status — can be found in v....
Release Date 2018/01 -
Surviving a Day Without Smartphones
Author Massimo Bergami , Gabriele Morandin , Marcello Russo
For young adults accustomed to continually checking their cellphones, even a single day without access to them can be anxiety-producing. What are the implications for executives about managing this constantly connected generation – and their devices – i....
Release Date 2018/01 -
How to Choose the Right Digital Leader for Your Company
Author Nikolaus Obwegeser , Michael Wade
Striking the right balance between competence and credibility is essential to digital leaders’ success, but it depends on what a company expects its CDO to do. While external candidates can bring critical digital competence and experience to organizations seeking a....
Release Date 2019/05 -
CISA® Certified Information Systems Auditor All-in-One Exam Guide
Author Peter H. Gregory
"All-in-One is All You Need."CISA Certified Information Systems Auditor All in One Exam GuideGet complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit ....
Release Date 2009/10 -
CISSP Certification All-in-One Exam Guide, Fourth Edition, 4th Edition
Author Shon Harris
All-in-One is All You NeedFully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this....
Release Date 2007/11 -
Author Shon Harris
Get complete coverage of the latest release of the Certified Information Systems Security Professional (CISSP) exam inside this comprehensive, fully updated resource. Written by the leading expert in IT security certification and training, this authoritative guide c....
Release Date 2010/01 -
CBAP Certified Business Analysis Professional All-in-One Exam Guide
Author Joseph Phillips
All-in-One is All You Need!Get complete coverage of all the material included on the International Institute of Business Analysis CBAP exam inside this comprehensive resource. Written by industry expert, trainer, and project management consultant Joseph Phillips, th....
Release Date 2009/07 -
Author Himanshu Dwivedi , Chris Clark , David Thiel
Secure today's mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how ....
Release Date 2010/02 -
Principles of Digital Audio, Sixth Edition, 6th Edition
Author Ken C. Pohlmann
The definitive guide to digital engineering--fully updatedGain a thorough understanding of digital audio tools, techniques, and practices from this completely revised and expanded resource. Written by industry pioneer and Audio Engineering Society Fellow Ken C. Pohl....
Release Date 2010/10 -
Programming and Customizing the Multicore Propeller Microcontroller: The Official Guide
Author Parallax
The Only Official Guide to the Parallax Multicore Propeller MicrocontrollerWritten by a team of Propeller experts, this authoritative guide shows you how to realize your design concepts by taking full advantage of the multicore Propeller microcontroller's unique ar....
Release Date 2010/02 -
Author Shon Harris
Don't Let the Real Test Be Your First Test!Written by the leading expert in IT security certification and training, CISSP Practice Exams is filled with hundreds of realistic practice exam questions based on the latest release of the Certified Information Systems Se....
Release Date 2010/07 -
HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
Author Sima Caleb , Liu Vincent , Scambray Joel
The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today’s hacker. Written by recognized security practitioners and thought leaders, ....
Release Date 2010/10 -
Designing an IAM Framework with Oracle Identity and Access Management Suite
Author Scheidel Jeff
Develop and Implement an End-to-End IAM Solution Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management....
Release Date 2010/07 -
Computer Forensics InfoSec Pro Guide
Author David Cowen
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Infor....
Release Date 2013/03 -
Gray Hat Hacking The Ethical Hacker’s Handbook
Author Jonathan Ness , Chris Eagle , Shon Harris , Gideon Lenkey , Allen Harper , Terron Wil
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker'....
Release Date 2011/01 -
CSSLP Certification All-in-One Exam Guide
Author Daniel Shoemaker , Wm. Arthur Conklin
Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam. CSSLP All-in-One Exam Guide covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC2). Y....
Release Date 2013/12 -
Wireless Network Security: A Beginner’s Guide
Author Tyler Wrightson
Security Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and....
Release Date 2012/04 -
All-in-One CISA® Certified Information Systems Auditor: Exam Guide, Second Edition
Author Peter Gregory
"All-in-One is All You Need"The new edition of this trusted resource offers complete, up-to-date coverage of all the material included on the latest release of the Certified Information Systems Auditor exam. Written by an IT security and audit expert, CISA Certified....
Release Date 2011/08 -
Clients, Clients, and More Clients
Author Larina Kase
TURN EVERY BUSINESS CONNECTION INTO A PAYING CLIENTWith a Foreword by Michael Port, bestselling author of Book Yourself SolidClients, Clients, and More Clients arms you with powerful tools from the field of psychology for building every business connection into the ....
Release Date 2011/09 -
SSCP® Systems Security Certified Practitioner All-in-One Exam Guide
Author Darril Gibson
Get complete coverage of all the material on the Systems Security Certified Practitioner (SSCP) exam inside this comprehensive resource. Written by a leading IT security certification and training expert, this authoritative guide addresses all seven SSCP domains as ....
Release Date 2011/11 -
CEH Certified Ethical Hacker All-in-One Exam Guide
Author Matt Walker
Get complete coverage of all the objectives included on the EC-Council’s Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You’ll find learn....
Release Date 2011/09 -
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Author Gregory Carpenter , Sean Bodmer , Jade Jones , Jeff Jones , Dr. Max Kilger
A complete guide to understanding and fighting advanced persistent threats—today's most destructive risk to enterprise securityReverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize the....
Release Date 2012/07 -
Author Vincent Liu , Bryan Sullivan
Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks.This....
Release Date 2011/11 -
CASP CompTIA Advanced Security Practitioner Certification Study Guide (Exam CAS-001)
Author Dwayne Williams , Gregory White , Arthur Conklin
The best fully integrated study system available for CompTIA Advanced Security Practitioner (CASP) Exam CAS-001 With hundreds of practice questions and lab exercises, CASP CompTIA Advanced Security Practitioner Certification Study Guide covers what you need to know—....
Release Date 2012/10 -
Hacking Exposed 7: Network Security Secrets & Solutions
Author George Kurtz , Joel Scambray , Stuart McClure
A fully updated edition of the world’s bestselling computer security bookHacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persisten....
Release Date 2012/08 -
CISSP All-in-One Exam Guide, 6th Edition
Author Shon Harris
A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris. Well regarded for its engaging and informative style, CISSP All-in-One Exam Guide, Sixth Edition provides 100% complete co....
Release Date 2012/10 -
Author N. K. McCarthy
Based on proven, rock-solid computer incident response plansThe Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence. The book....
Release Date 2012/08