-
Author Mark Burnett
Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code d....
Release Date 2004/05 -
Control Systems Engineering, 3rd Edition
Author S. K. Bhattacharya
The book has been designed to cover the complete syllabi of Control Systems taught during various engineering courses at the undergraduate level. It would also help students appearing for competitive examinations like GATE, IAS, IES, NTPC and NHPC. The topics are ex....
Release Date 2013/05 -
Information Theory, Coding and Cryptography
Author Mandal , Nilotpal Manna , Arijit Saha
Information Theory, Coding & Cryptography has been designed as a comprehensive text for the students of engineering discussing Source Encoding, Error Control Codes & Cryptography. The book contains the recent developments of coded modulation, trellises for ....
Release Date 2013/05 -
Author Alyssa Miller
Kickstart a career in cybersecurity by adapting your existing technical and non-technical skills. Author Alyssa Miller has spent fifteen years in cybersecurity leadership and talent development, and shares her unique perspective in this revealing industry guide. In Cybersecurity Career Guide you....
Release Date 2022/06 -
Author Gregory J. Skulmoski
The demand for cybersecurity expertise is growing phenomenally; enhancing cybersecurity project skills will boost technology professionals’ careers and improve organizational cybersecurity readiness.Shields Up: Cybersecurity Project Management provides an end-to-end framework tuned for cybersecurity....
Release Date 2022/08 -
Author Rida Khatoun
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to i....
Release Date 2022/08 -
The Cybersecurity Playbook for Modern Enterprises
Author Jeremy Wittkop
Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniquesKey FeaturesUnderstand what happens in an attack and build the proper defenses to secure your organizationDefend against hacking techniques such as social engineering, phishi....
Release Date 2022/03 -
Security Operations in Practice
Author Mike Sheward
This book walks you through how to establish and grow a strong security operations team, including hiring the right people, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a ....
Release Date 2020/02 -
Digital Earth - Cyber threats, privacy and ethics in an age of paranoia
Author Sarah Katz
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
Release Date 2022/04 -
Author Jean Nestor M. Dahj
Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a proficient threat intelligence analyst to help strategic teams in making informed decisionsKey FeaturesBuild the analytics skills and practices you need for analyzing, detecting, an....
Release Date 2022/04 -
Executive's Guide to Cyber Risk
Author Siegfried Moyo
A solid, non-technical foundation to help executives and board members understand cyber riskIn the Executive's Guide to Cyber Risk: Securing the Future Today, distinguished information security and data privacy expert Siegfried Moyo delivers an incisive and foundational guidance for executives task....
Release Date 2022/08 -
Author Cynthia Brumfield , Brian Haugli
Cybersecurity Risk ManagementIn Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fund....
Release Date 2021/12 -
Author Jessica Barker , Adrian Davis , Bruce Hallas , Ciarán Mc Mahon
Cybersecurity problems don’t always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness, behaviour and culture change (ABCs). This book guides organisations looking to create an enhanced security culture through improved understanding and practic....
Release Date 2021/02 -
Porting to the Symbian Platform: Open Mobile Development in C/C++
Author Mark Wilcox
If you want to write mobile applications without the idioms of Symbian C++, have existing software assets that you'd like to re-use on Symbian devices, or are an open source developer still waiting for an open Linux-based device to gain significant market penetrati....
Release Date 2009/11 -
IT Security Controls: A Guide to Corporate Standards and Frameworks
Author Virgilio Viegas , Oben Kuyucu
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure.....
Release Date 2022/03 -
Cybersecurity Leadership Demystified
Author Dr. Erdal Ozkaya , Melih Abdulhayoglu
Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use casesKey FeaturesDiscover tips and expert advice from the leading CISO and author of many cybersecurity booksBecome well-versed with a CISO's day-to-day responsibilities and learn how to perform the....
Release Date 2022/01 -
Author Perry Carpenter , Kai Roer
Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture.The topic of security culture is mysterious and confusing to most leaders. But it doesn’t have to be. In The Security Culture Play....
Release Date 2022/04 -
Practical Negotiating: Tools, Tactics & Techniques
Author Tom Gosselin
Praise for Practical Negotiating: Tools, Tactics & Techniques"Practical Negotiating is an innovative, resourceful, and-as its name implies-practical guide to the art and science of negotiating. Unlike many books on negotiating, which are filled with theories and....
Release Date 2007/05 -
The Complete Idiot's Guide to Getting Organized Fast-Track
Author Cynthia Ewer
In our materialistic, time-crunched society, lifestyles are compromised by disorganization and clutter. In a 2008 National Association of Professional Organizers survey, 65 percent of respondents noted that their household was at least moderately disorganized, 71 pe....
Release Date 2012/11 -
Intelligent Security Management and Control in the IoT
Author Mohamed-Aymen Chalouf
The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with the IoT can cause performance and security problems. This relates to important challenges such as the control of radio communications....
Release Date 2022/06 -
Implementing Digital Forensic Readiness, 2nd Edition
Author Jason Sachowski
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with....
Release Date 2019/05 -
VHF / UHF Filters and Multicouplers: Application of Air Resonators
Author Bernard Piette
This book describes the various devices used in radio communication and broadcasting to achieve high selectivity filtering and coupling. After providing a background in the basics of microwave theory and more detailed material - including a special chapter on precis....
Release Date 2010/02 -
End-to-End Adaptive Congestion Control in TCP/IP Networks
Author George A. Rovithakis , Christos N. Houmkozlis
Establishing adaptive control as an alternative framework to design and analyze Internet congestion controllers, End-to-End Adaptive Congestion Control in TCP/IP Networks employs a rigorously mathematical approach coupled with a lucid writing style to provide extens....
Release Date 2017/12 -
Penetration Tester's Open Source Toolkit, 3rd Edition
Author Jeremy Faircloth
Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes ha....
Release Date 2011/08 -
OAuth 2.0 Identity and Access Management Patterns
Author Martin Spasovski
Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.Build web, client-side, desktop,....
Release Date 2013/11 -
Author Stefano Fornari
Sync your email and other data with mobile devices using Funambol 7.1 About This BookProvide push email capabilities and synchronization services for mobile devices and PC software using Funambol Develop your own Funambol extensions Many examples explaining all fun....
Release Date 2009/12 -
Penetration Testing Services Procurement Guide
Author CREST
Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities.It presents a useful over....
Release Date 2014/05 -
Sociology and Social Anthropology in India
Author Yogesh Atal
The Indian Council of Social Science Research, the premier organization for social science research in India, conducts periodic surveys in the major disciplines of the social sciences to assess disciplinary developments as well as to identify gaps in research in ....
Release Date 2009/02 -
Cybersecurity and Local Government
Author Donald F. Norris , Laura K. Mateczun , Richard F. Forno
CYBERSECURITY AND LOCAL GOVERNMENTLearn to secure your local government’s networks with this one-of-a-kind resourceIn Cybersecurity and Local Government, a distinguished team of researchers delivers an insightful exploration of cybersecurity at the level of local government. The book makes a compell....
Release Date 2022/04 -
Author Steve Schroeder
The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber Criminals provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. The materials presented offer a wealth of in....
Release Date 2011/02