Author Mark BurnettHacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code d....
Release Date 2004/05
Control Systems Engineering, 3rd Edition
Author S. K. BhattacharyaThe book has been designed to cover the complete syllabi of Control Systems taught during various engineering courses at the undergraduate level. It would also help students appearing for competitive examinations like GATE, IAS, IES, NTPC and NHPC. The topics are ex....
Release Date 2013/05
Information Theory, Coding and Cryptography
Author Mandal , Nilotpal Manna , Arijit SahaInformation Theory, Coding & Cryptography has been designed as a comprehensive text for the students of engineering discussing Source Encoding, Error Control Codes & Cryptography. The book contains the recent developments of coded modulation, trellises for ....
Release Date 2013/05
End-to-End Adaptive Congestion Control in TCP/IP Networks
Author George A. Rovithakis , Christos N. HoumkozlisEstablishing adaptive control as an alternative framework to design and analyze Internet congestion controllers, End-to-End Adaptive Congestion Control in TCP/IP Networks employs a rigorously mathematical approach coupled with a lucid writing style to provide extens....
Release Date 2017/12
Porting to the Symbian Platform: Open Mobile Development in C/C++
Author Mark WilcoxIf you want to write mobile applications without the idioms of Symbian C++, have existing software assets that you'd like to re-use on Symbian devices, or are an open source developer still waiting for an open Linux-based device to gain significant market penetrati....
Release Date 2009/11
CBAP®/CCBA™ Certified Business Analysis, Study Guide
Author Terri Wagner , Susan WeeseA must-have resource for anyone preparing for the version 2.0 of the CBAP examAs organizations look to streamline their production models, the need for qualified and certified business analysts is growing. The Certified Business Analyst Professional (CBAP) certifica....
Release Date 2011/05
SCSP SNIA Certified Storage Professional All-in-One Exam Guide (Exam S10-110)
Author Eric VanderburgThis effective self-study guide offers 100% coverage of the challenging SCSP SNIA Certified Storage Professional examGet complete coverage of all the SCSP exam objectives inside this comprehensive resource. Written by Eric Vanderburg, a leading expert on storage cer....
Release Date 2017/03
Practical Negotiating: Tools, Tactics & Techniques
Author Tom GosselinPraise for Practical Negotiating: Tools, Tactics & Techniques"Practical Negotiating is an innovative, resourceful, and-as its name implies-practical guide to the art and science of negotiating. Unlike many books on negotiating, which are filled with theories and....
Release Date 2007/05
The Complete Idiot's Guide to Getting Organized Fast-Track
Author Cynthia EwerIn our materialistic, time-crunched society, lifestyles are compromised by disorganization and clutter. In a 2008 National Association of Professional Organizers survey, 65 percent of respondents noted that their household was at least moderately disorganized, 71 pe....
Release Date 2012/11
Mahara ePortfolios Beginner's Guide
Author Derrin Kent , Thomas Bell , Richard HandCreate your own e-Portfolio and Communities of Interest within an Educational or Professional Organization with this book and ebook.A step-by-step approach that takes you through examples with ample screenshots and clear explanationsCreate, customize, and maintain....
Release Date 2012/07
Get Clients Now! (TM), 3rd Edition
Author Jay Conrad Levinson , C.J. HaydenGet Clients Now! has helped thousands of independent professionals dramatically increase their client base. With this uniquely practical guide, it’s easy to replace scattershot marketing and networking efforts with proven and targeted tactics. Using a sim....
Release Date 2013/05
The Manager's Pocket Guide to Diversity Management
Author Dr. Edward E. HubbardThis pocket guide will teach you the skills required to effectively manage a diverse workplace—not because it's the "right thing to do" or your organization requires it, but because it is good for business. Gain diversity awareness, tools, knowledge and techniques ....
Release Date 2004/01
Kali Linux Wireless Penetration Testing : Beginner's Guide
Author Vivek Ramachandran , Cameron BuchananMaster wireless testing techniques to survey and attack wireless networks with Kali LinuxIn DetailAs wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The K....
Release Date 2015/03
VHF / UHF Filters and Multicouplers: Application of Air Resonators
Author Bernard PietteThis book describes the various devices used in radio communication and broadcasting to achieve high selectivity filtering and coupling. After providing a background in the basics of microwave theory and more detailed material - including a special chapter on precis....
Release Date 2010/02
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT
Author Robert E. KressUncover the secrets of an award-winning IT function and apply them to your business!Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten year....
Release Date 2011/10
Cyber Crime and Cyber Terrorism Investigator's Handbook
Author Francesca Bosco , Andrew Staniforth , Babak AkhgarCyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become ....
Release Date 2014/07
How Did I Not See This Coming?: A New Manager's Guide to Avoiding Total Disaster
Author Katy TynanJulie’s having a very bad day. She’s a new manager, and her top performer has resigned to escape her, and her own manager is looking on with a skeptical eye. . . . This is the story of her turnaround. Being a first-time manager is a tough job. If you ....
Release Date 2017/12
Incident Response & Computer Forensics, Third Edition, 3rd Edition
Author Kevin Mandia , Matthew Pepe , Jason LuttgensThe definitive guide to incident response--updated for the first time in a decade!Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get ....
Release Date 2014/08
Incident Response & Computer Forensics, 2nd Ed.
Author Chris Prosise , Kevin MandiaWritten by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book s....
Release Date 2003/07
The Antivirus Hacker's Handbook
Author Elias Bachaalany , Joxean KoretHack your antivirus software to stamp out future vulnerabilitiesThe Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future ....
Release Date 2015/09
Penetration Tester's Open Source Toolkit, 3rd Edition
Author Jeremy FairclothPenetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes ha....
Release Date 2011/08
Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)
Author Mike MeyersAn all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike MeyersIn Mike Meyers’ CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effect....
Release Date 2015/07
Web Application Defender's Cookbook
Author Jeremiah Grossman , Ryan C. BarnettDefending your web applications against hackers and attackersThe top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect c....
Release Date 2012/12
CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS)
Author Earl CarterUnderstand how Cisco IDS can be used to protect, monitor, and enforce physical security policiesReview techniques applicable to both network- and host-based platformsReview the security wheel concepts and apply security to AVVID using the SAFE BlueprintInstall and c....
Release Date 2004/02
The Little Book of HTML/CSS Coding Guidelines
Author Jens Oliver MeiertA proper plan can improve your code, including your HTML documents and CSS style sheets. Jens Oliver Meiert explores the theory and practice of coding guidelines and shows, using Google’s HTML and CSS standards as a particular example, how consistency and care can ....
Release Date 2015/12
ISO 50001 Energy Management Systems
Author Johannes KalsManagers and academia targeting energy performance improvements have a valuable tool in ISO 50001 Energy Management Systems, which allows for a certification after third-party audits. Business managers may reduce costs and fully tap the strategic potential ....
Release Date 2015/07
Mastering Wireless Penetration Testing for Highly Secured Environments
Author Aaron JohnsScan, exploit, and crack wireless networks by using the most advanced techniques from security professionalsIn DetailPenetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By ....
Release Date 2015/01
Penetration Testing: Protecting Networks and Systems
Author Kevin M. HenryPreparation for the Certified Penetration Testing Engineer (CPTE) examination Penetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack. The Certifie....
Release Date 2012/06
Governance and Internal Controls for Cutting Edge IT
Author Karen F. WorstellIT security risks are constantly changing, so how do we stay ahead? To remain competitive we rely on being early adopters of new technologies — but there are inherent risks. As we implement these technologies, how do we manage the risks without hindering the progres....
Release Date 2013/03