-
Measuring and Improving Social Impacts
Author Kristi Yuthas , Marc J. Epstein
The world is beset with enormous problems. And as a nonprofit, NGO, foundation, impact investor, or socially responsible company, your organization is on a mission to solve them. But what exactly should you do? And how will you know whether it’s working? Too many ....
Release Date 2014/03 -
Governance of IT - An executive guide to ISO/IEC 38500
Author A. L. Holt
Directors and government ministers across the world are increasingly being held accountable for failed IT systems, data loss and poor decisions about their organisation’s data. This valuable book is designed to bridge the gap between the governing body and CIOs/ IT ....
Release Date 2013/09 -
Bring Your Own Device - The mobile computing challenge
Author BCS , The Chartered Institute for IT
The increasing use of personal devices such as smartphones and tablets in the workplace at work is offering an opportunity as well as a challenge for organisations, in particular the IT department. This ebook looks at ways to embrace the benefits of BYOD while offer....
Release Date 2013/05 -
Building a Pentesting Lab for Wireless Networks
Author Andrey Popov , Vyacheslav Fadyushin
Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniquesAbout This BookDesign and build an extendable penetration testing lab with wireless access suitable for home and enterprise useFill the lab with various compo....
Release Date 2016/03 -
Author David Routin , Simon Thoores , Samuel Rossier
Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniquesKey FeaturesApply real-world strategies to strengthen the capabilities of your organization's security systemLearn t....
Release Date 2022/06 -
Practical Threat Intelligence and Data-Driven Threat Hunting
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat h.... -
Author S. K. Basu
Auditing is a multi-dimensional subject. The scope of auditing is not only restricted to financial audit under the Companies Act, but has also been extended to cost accounting aspects, managerial policies, operational efficiencies and system applications and audit u....
Release Date 2009/07 -
Author Anton Chuvakin , Cyrus Peikari
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find ou....
Release Date 2004/01 -
Pause & Effect: The Art of Interactive Narrative
Author Mark Stephen Meadows
Interactive narrative is the cornerstone for many forms of digital media: web sites, interface design, gaming environments, and even artificial intelligence. In Pause & Effect, Mark Stephen Meadows examines the intersection of storytelling, visual art, and inter....
Release Date 2002/09 -
Author Himanshu Dwivedi , Chris Clark , David Thiel
Secure today's mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how ....
Release Date 2010/02 -
Incident Response & Computer Forensics, Third Edition, 3rd Edition
Author Kevin Mandia , Matthew Pepe , Jason Luttgens
The definitive guide to incident response--updated for the first time in a decade!Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get ....
Release Date 2014/08 -
Quicken 2015 The Official Guide, 3rd Edition
Author Bobbi Sandberg
The ONLY official guide to the 2015 release of the #1 bestselling personal finance software“Intuit-approved and loaded with secrets, this book provides you with recipes for financial success.” –Scott Cook, Co-Founder, Intuit, Inc.Quicken 2015: The Official Guide sho....
Release Date 2014/11 -
Implementing Digital Forensic Readiness
Author Jason Sachowski
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organizati....
Release Date 2016/02 -
Indoor Navigation Strategies for Aerial Autonomous Systems
Author Pedro Garcia Gil , Laura Elena Munoz Hernandez , Pedro Castillo-Garcia
Indoor Navigation Strategies for Aerial Autonomous Systems presents the necessary and sufficient theoretical basis for those interested in working in unmanned aerial vehicles, providing three different approaches to mathematically represent the dynamics of an aeria....
Release Date 2016/11 -
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Author Ali Dehghantanha , Kim-Kwang Raymond Choo
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners an....
Release Date 2016/10 -
Network Basics Companion Guide, Video Enhanced Edition
Author Cisco Networking Academy
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.Using a top-down OSI model approach, the course introduces the architecture, structure, functi....
Release Date 2013/12 -
CISSP Practice Questions Exam Cram, Fourth Edition
Author Michael Gregg
CISSP Practice Questions Exam Cram, Fourth EditionCISSP Practice Questions Exam Cram, Fourth Edition complements any CISSP study plan with 1,038 practice test questions in the book and on the companion site–all supported by complete explanations of every answer. Th....
Release Date 2016/06 -
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits, First edition
Author William Easttom
The perfect introduction to pen testing for all IT professionals and studentsClearly explains key concepts, terminology, challenges, tools, and skillsCovers the latest penetration testing standards from NSA, PCI, and NISTWelcome to today’s most useful and practical....
Release Date 2018/03 -
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
Author Madjid Nakhjiri , Mahsa Nakhjiri
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.AAA and Network Security for Mobile Access is an invalua....
Release Date 2005/10 -
Author Agnieszka Klus , John Bambenek
grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it....
Release Date 2009/01 -
Taxation for Decision Makers, 2012 Edition
Author Karen A. Fortin , Shirley Dennis-Escoffier
The 2012 edition of this text has been completely updated for new legislation including the Tax Relief, Unemployment Insurance Reauthorization, and Job Creation Act of 2010, the Small Business Jobs Act, The Patient Protection and Affordable Care Act, and the Health ....
Release Date 2011/07 -
Author André Årnes
The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical fieldWritten by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab)....
Release Date 2017/07 -
DAVID BUSCH’S NIKON® D800/D800E GUIDE TO DIGITAL SLR PHOTOGRAPHY
Author David D. Busch
Are you looking for a sure, complete guide to your new Nikon D800/D800E? If so, DAVID BUSCH'S NIKON D800/D800E GUIDE TO DIGITAL SLR PHOTOGRAPHY is the perfect companion for you. The Nikon D800/D800E is the long-anticipated replacement for Nikon's D700 full-frame (....
Release Date 2012/09 -
Author Chris Jackson - CCIE No. 6256
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.Cisco network security expert Chris Jackson begins with a thorough overview ....
Release Date 2010/06 -
Author Brian T Contos
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist thre....
Release Date 2006/10 -
Author Richard Watson , Stephen Pearson
Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex....
Release Date 2010/07 -
Author Eric Cole
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with b....
Release Date 2012/12 -
International Social Entrepreneurship
Author Joseph Mark Munoz
The book is attractive to the target readers for the following reasons : 1) there has been a growing interest in the topic of social entrepreneurship and yet there are limited academic materials, this book will offer a concise, straight-forward compilation of theori....
Release Date 2010/06