-
Getting Your Retirement Act Right
Author Trent Hamm
This Element is an excerpt from The Simple Dollar: How One Man Wiped Out His Debts and Achieved the Life of His Dreams (9780137054251) by Trent Hamm. Available in print and digital formats.Retirement: how to start imagining and planning your exciting “next act”!Reti....
Release Date 2010/07 -
Network Defense and Countermeasures: Principles and Practices, Second Edition
Author William Easttom II
Network Defense and Countermeasures:Principles and PracticesEverything you need to know about modern network attacks and defense, in one bookClearly explains core network security concepts, challenges, technologies, and skills Thoroughly updated for the latest attac....
Release Date 2013/10 -
Programming Mobile Devices: An Introduction for Practitioners
Author Tommi Mikkonen
With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems.Learn how to programme the mobile devices of the future!The importance of mobile systems programming has emerged over the recent years as a new domain in software development. The design of ....
Release Date 2007/03 -
Author Sunil Wadhwa , Joe Kelly , Ken Draper , David Delcourt , Vik Davar , Stefan Brunner
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutio....
Release Date 2008/02 -
Sliding Mode Control of Uncertain Parameter-Switching Hybrid Systems
Author Xiaojie Su , Peng Shi , Ligang Wu
In control theory, sliding mode control (SMC) is a nonlinear control method that alters the dynamics of a nonlinear system by application of a discontinuous control signal that forces the system to slide along a cross-section of the system's normal behaviour. In re....
Release Date 2014/07 -
Advanced Electric Drives: Analysis, Control, and Modeling Using MATLAB/Simulink
Author Ned Mohan
With nearly two-thirds of global electricity consumed by electric motors, it should come as no surprise that their proper control represents appreciable energy savings. The efficient use of electric drives also has far-reaching applications in such areas as factory ....
Release Date 2014/08 -
Social Movements for Good: How Companies and Causes Create Viral Change
Author Derrick Feldmann
Create real change in the new social movement paradigmSocial Movements for Good is a guidebook for driving change, by taking advantage of the social "currency" that makes movements go viral. Author Derrick Feldmann has spent a career showing organizations how to be....
Release Date 2016/02 -
The Official (ISC)2 Guide to the SSCP CBK, 3rd Edition
Author Steven Hernandez , Adam Gordon
The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is one of the most popular and ideal credential for those wanting to expand their security career and highlight their security skills. If you are looking to embark on the journey towards your (....
Release Date 2015/11 -
The Little Book of HTML/CSS Coding Guidelines
Author Jens Oliver Meiert
A proper plan can improve your code, including your HTML documents and CSS style sheets. Jens Oliver Meiert explores the theory and practice of coding guidelines and shows, using Google’s HTML and CSS standards as a particular example, how consistency and care can ....
Release Date 2015/12 -
Author Chris Jackson - CCIE No. 6256
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.Cisco network security expert Chris Jackson begins with a thorough overview ....
Release Date 2010/06 -
Author Eric Cole
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with b....
Release Date 2012/12 -
International Social Entrepreneurship
Author Joseph Mark Munoz
The book is attractive to the target readers for the following reasons : 1) there has been a growing interest in the topic of social entrepreneurship and yet there are limited academic materials, this book will offer a concise, straight-forward compilation of theori....
Release Date 2010/06 -
Author Konstantin Sapronov , Ayman Shaaban
Leverage the power of digital forensics for Windows systemsAbout This BookBuild your own lab environment to analyze forensic data and practice techniques.This book offers meticulous coverage with an example-driven approach and helps you build the key skills of perf....
Release Date 2016/06 -
Oracle SOA Governance 11g Implementation
Author Andrew Bell , Luis Augusto Weir
Being able to implement SOA governance competently can make a huge difference to your organization’s efficiency. This guide shows you how through a complete practical course based on Oracle’s highly regarded software suite.Understand SOA governance including its key....
Release Date 2013/09 -
Control Systems Engineering, Second Edition
Author S. K. Bhattacharya
Control Systems Engineering is a comprehensive text designed to cover the complete syllabi of the subject offered at various engineering disciplines at the undergraduate level. The book begins with a discussion on open-loop and closed-loop control systems. The block....
Release Date 2008/11 -
Author S. Salivahanan
Control Systems Engineering caters to the requirements of an interdisciplinary course on Control Systems at the under- graduate level. Featuring a balanced coverage of time response and frequency response analyses, the book provides an in-depth review of key topics....
Release Date 2015/04 -
Penetration Testing and Network Defense
Author Daniel P. Newman , Andrew Whitaker
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plansLearn to perform social engineering and host reconnaissanceEvaluate session hijacking methodsExploit web server vulnerabilitiesDetect attempts to breach ....
Release Date 2005/10 -
Mike Meyers's CompTIA Security+ Certification Passport, Fourth Edition (Exam SY0-401)
Author T. J. Samuelle , Dawn Dunkerley
From the #1 Name in Professional CertificationPrepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional—a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.Get o....
Release Date 2014/06 -
Managing Information Security, 2nd Edition
Author John R. Vacca
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,....
Release Date 2013/08 -
Cyber Crime and Cyber Terrorism Investigator's Handbook
Author Francesca Bosco , Andrew Staniforth , Babak Akhgar
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become ....
Release Date 2014/07 -
Hacking and Penetration Testing with Low Power Devices
Author Philip Polstra
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a lapto....
Release Date 2014/09 -
Author Justin Rainey , Timothy Virtue
The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC². The new HCISPP certification, focused on health care information security and privacy, is similar ....
Release Date 2014/12 -
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Author Ali Dehghantanha , Kim-Kwang Raymond Choo
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners an....
Release Date 2016/10 -
Network Basics Companion Guide
Author Cisco Networking Academy
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.Using a top-down OSI model approach, the course introduces the architecture, structure, f....
Release Date 2013/12 -
Network Basics Companion Guide, Video Enhanced Edition
Author Cisco Networking Academy
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.Using a top-down OSI model approach, the course introduces the architecture, structure, functi....
Release Date 2013/12 -
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits, First edition
Author William Easttom
The perfect introduction to pen testing for all IT professionals and studentsClearly explains key concepts, terminology, challenges, tools, and skillsCovers the latest penetration testing standards from NSA, PCI, and NISTWelcome to today’s most useful and practical....
Release Date 2018/03 -
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
Author Madjid Nakhjiri , Mahsa Nakhjiri
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.AAA and Network Security for Mobile Access is an invalua....
Release Date 2005/10 -
Author Agnieszka Klus , John Bambenek
grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it....
Release Date 2009/01