-
Author Luke Wroblewski
Our industry’s long wait for the complete, strategic guide to mobile web design is finally over. Former Yahoo! design architect and co-creator of Bagcheck Luke Wroblewski knows more about mobile experience than the rest of us, and packs all he knows into this entert....
Release Date 2011/05 -
Sarbanes-Oxley Ongoing Compliance Guide: Key Processes and Summary Checklists
Author Anne M. Marchetti
Quick and easy implementation and maintenance guide for ongoing Sarbanes-Oxley compliance For most companies, achieving compliance to the Sarbanes-Oxley Act (SOX) has proven to be more challenging, and more costly, than initially anticipated. In many cases, initial ....
Release Date 2007/03 -
Author Martin Nystrom , Chris Fry
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to mon....
Release Date 2009/02 -
Author David D. Busch
DAVID BUSCH'S NIKON D3200 GUIDE TO DIGITAL SLR PHOTOGRAPHY is your onestop resource and reference for the Nikon D3200, the latest entrylevel DSLR in the Nikon product line, featuring a 16.2 megapixel sensor, full HDTV video, and ISO up to 12,800. With this book in ....
Release Date 2012/07 -
Protect Your Wealth from the Ravages of Inflation: A Three-Step Method
Author Paul M. King
Protect Your Wealth from the Ravages of Inflation is for people who have financial assets to protect in an unpredictable, inflationary environment. Maybe you have tried traditional financial advice, financial planning, and passive investment management techniques an....
Release Date 2011/08 -
The Manager’s Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web
Author Ron Lepofsky
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnera....
Release Date 2014/12 -
The Little Book of HTML/CSS Coding Guidelines
Author Jens Oliver Meiert
A proper plan can improve your code, including your HTML documents and CSS style sheets. Jens Oliver Meiert explores the theory and practice of coding guidelines and shows, using Google’s HTML and CSS standards as a particular example, how consistency and care can ....
Release Date 2015/12 -
Author Tobias Klein
"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."–Felix 'FX' LindnerA Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world....
Release Date 2011/11 -
Author Eric Cole
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with b....
Release Date 2012/12 -
Measuring and Improving Social Impacts
Author Kristi Yuthas , Marc J. Epstein
The world is beset with enormous problems. And as a nonprofit, NGO, foundation, impact investor, or socially responsible company, your organization is on a mission to solve them. But what exactly should you do? And how will you know whether it’s working? Too many ....
Release Date 2014/03 -
Author Zaid Hassan
Current responses to our most pressing societal challenges—from poverty to ethnic conflict to climate change—are not working. These problems are incredibly dynamic and complex, involving an ever-shifting array of factors, actors, and circumstances. They demand a hig....
Release Date 2014/02 -
Author Konstantin Sapronov , Ayman Shaaban
Leverage the power of digital forensics for Windows systemsAbout This BookBuild your own lab environment to analyze forensic data and practice techniques.This book offers meticulous coverage with an example-driven approach and helps you build the key skills of perf....
Release Date 2016/06 -
Building a Pentesting Lab for Wireless Networks
Author Andrey Popov , Vyacheslav Fadyushin
Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniquesAbout This BookDesign and build an extendable penetration testing lab with wireless access suitable for home and enterprise useFill the lab with various compo....
Release Date 2016/03 -
Enhancing Learning and Teaching Through Student Feedback in Social Sciences
Author Patricie Mertova , Chenicheri Sid Nair
This title is the second Chandos Learning and Teaching Series book that explores themes surrounding enhancing learning and teaching through student feedback. It expands on topics covered in the previous publication, and focuses on social science disciplines. The edi....
Release Date 2013/02 -
ISO27001 / ISO27002 A Pocket Guide
Author Alan Calder
Use ISO27001 to protect your organisation's information assets This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Read this pocket guide to learn about: The ISO/IEC 27000Family of Info....
Release Date 2008/10 -
Oracle SOA Governance 11g Implementation
Author Andrew Bell , Luis Augusto Weir
Being able to implement SOA governance competently can make a huge difference to your organization’s efficiency. This guide shows you how through a complete practical course based on Oracle’s highly regarded software suite.Understand SOA governance including its key....
Release Date 2013/09 -
Sniffer Pro Network Optimization & Troubleshooting Handbook
Author Syngress
Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Networ....
Release Date 2002/08 -
Author Michael Mulholland
Bridging theory and practice, this book contains over 200 practical exercises and their solutions, to develop the problem-solving abilities of process engineers. The problems were developed by the author during his many years of teaching at university a....
Release Date 2016/12 -
Pause & Effect: The Art of Interactive Narrative
Author Mark Stephen Meadows
Interactive narrative is the cornerstone for many forms of digital media: web sites, interface design, gaming environments, and even artificial intelligence. In Pause & Effect, Mark Stephen Meadows examines the intersection of storytelling, visual art, and inter....
Release Date 2002/09 -
IBM Information Governance Solutions
Author Sandeep Shah , Erik A O'neill , Marc Haber , Christopher Giardina , Gary Brunell
Managing information within the enterprise has always been a vital and important task to support the day-to-day business operations and to enable analysis of that data for decision making to better manage and grow the business for improved profitability. To do all t....
Release Date 2014/04 -
Information Governance Principles and Practices for a Big Data Landscape
Author Harald Smith , Barry Rosen , Bill Plants , Ivan Milman , Tom Jesionowski , Cindy Comp
This IBM® Redbooks® publication describes how the IBM Big Data Platform provides the integrated capabilities that are required for the adoption of Information Governance in the big data landscape.As organizations embark on new use cases, such as Big Data Exploration....
Release Date 2014/03 -
CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS)
Author Earl Carter
Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policiesReview techniques applicable to both network- and host-based platformsReview the security wheel concepts and apply security to AVVID using the SAFE BlueprintInstall and c....
Release Date 2004/02 -
Hacking and Penetration Testing with Low Power Devices
Author Philip Polstra
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a lapto....
Release Date 2014/09 -
Network Defense and Countermeasures: Principles and Practices, Second Edition
Author William Easttom II
Network Defense and Countermeasures:Principles and PracticesEverything you need to know about modern network attacks and defense, in one bookClearly explains core network security concepts, challenges, technologies, and skills Thoroughly updated for the latest attac....
Release Date 2013/10 -
The Effect of Temperature and other Factors on Plastics and Elastomers, 3rd Edition
Author Laurence W. McKeen
This reference guide brings together a wide range of critical data on the effect of temperature on plastics and elastomers, enabling engineers to make optimal material choices and design decisions. The effects of humidity level and strain rate on mechanical and elec....
Release Date 2014/04 -
Error Control Coding For B3G/4G Wireless Systems: Paving the Way to IMT-Advanced Standards
Author Dr. Moshe Ran , Dr. Thierry Lestable
Covering the fast evolving area of advanced coding, Error Control Coding for B3G/4G Wireless Systems targets IMT-Advanced systems to present the latest findings and implementation solutions. The book begins by detailing the fundamentals of advanced coding techniques....
Release Date 2011/06 -
Author Agnieszka Klus , John Bambenek
grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it....
Release Date 2009/01 -
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition
Author Ted G. Lewis
"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)"The book is written as a student t....
Release Date 2014/11 -
Sliding Mode Control of Uncertain Parameter-Switching Hybrid Systems
Author Xiaojie Su , Peng Shi , Ligang Wu
In control theory, sliding mode control (SMC) is a nonlinear control method that alters the dynamics of a nonlinear system by application of a discontinuous control signal that forces the system to slide along a cross-section of the system's normal behaviour. In re....
Release Date 2014/07 -
Author Chad Udell
Discover the strategies, tools, and technologies necessary for developing successful mobile learning programsIn the modern, rapidly-expanding mobile learning environment, only clear guidelines and state-of-the-art technologies will stand up to the challenges that li....
Release Date 2014/10