-
CBAP®/CCBA™ Certified Business Analysis, Study Guide
Author Terri Wagner , Susan Weese
A must-have resource for anyone preparing for the version 2.0 of the CBAP examAs organizations look to streamline their production models, the need for qualified and certified business analysts is growing. The Certified Business Analyst Professional (CBAP) certifica....
Release Date 2011/05 -
VHF / UHF Filters and Multicouplers: Application of Air Resonators
Author Bernard Piette
This book describes the various devices used in radio communication and broadcasting to achieve high selectivity filtering and coupling. After providing a background in the basics of microwave theory and more detailed material - including a special chapter on precis....
Release Date 2010/02 -
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will.... -
Penetration Tester's Open Source Toolkit, 3rd Edition
Author Jeremy Faircloth
Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes ha....
Release Date 2011/08 -
OAuth 2.0 Identity and Access Management Patterns
Author Martin Spasovski
Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.Build web, client-side, desktop,....
Release Date 2013/11 -
Author Svetlana Ostrovskaya , Oleg Skulkin
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey FeaturesExplore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware detection using volatile memoryGet acquainted wi....
Release Date 2022/03 -
Mastering Windows Security and Hardening - Second Edition
Author Mark Dunkerley , Matt Tumbarello
A comprehensive guide to administering and protecting the latest Windows 11 and Windows server operating system from ongoing cyber threats using zero-trust security principlesKey FeaturesLearn to protect your Windows environment using zero-trust and a multi-layered security approachImplement securit....
Release Date 2022/08 -
Author Stefano Fornari
Sync your email and other data with mobile devices using Funambol 7.1 About This BookProvide push email capabilities and synchronization services for mobile devices and PC software using Funambol Develop your own Funambol extensions Many examples explaining all fun....
Release Date 2009/12 -
Author Steve Schroeder
The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber Criminals provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. The materials presented offer a wealth of in....
Release Date 2011/02 -
Author Ryan Leirvik
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are availabl....
Release Date 2022/01 -
How Did I Not See This Coming?: A New Manager's Guide to Avoiding Total Disaster
Author Katy Tynan
Julie’s having a very bad day. She’s a new manager, and her top performer has resigned to escape her, and her own manager is looking on with a skeptical eye. . . . This is the story of her turnaround. Being a first-time manager is a tough job. If you ....
Release Date 2017/12 -
Author Leeza Garber , Scott Olson
Building a successful cybersecurity team is no longer optional.Cyberthreats evolve at a staggering pace, and effective cybersecurity operations depend on successful teams. Unfortunately, statistics continue to illustrate that employers are not finding the people they need.The Can. Trust. Will. syste....
Release Date 2022/01 -
Author Amr Sukkar
This book tries to support the elaboration and implementation of strategies and to foster SMEs and entrepreneurship development.Most of businesses fall within the category of start-up, small and medium size enterprises. Therefore, governments in part of their quest to reform the economy and related ....
Release Date 2022/08 -
Incident Response & Computer Forensics, 2nd Ed.
Author Chris Prosise , Kevin Mandia
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book s....
Release Date 2003/07 -
Author George Varghese
In designing a network device, you make dozens of decisions that affect the speed with which it will perform—sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other d....
Release Date 2004/12 -
Author Paul Wheeler
High end digital cinematography can truly challenge the film camera in many of the technical, artistic and emotional aspects of what we think of as 'cinematography'. This book is a guide for practising and aspiring cinematographers and DOPs to digital cinema....
Release Date 2013/05 -
Author Pedro H. J. Nardelli
CYBER-PHYSICAL SYSTEMSProvides a unique general theory of cyber-physical systems, focusing on how physical, data, and decision processes are articulated as a complex whole Cyber-physical systems (CPS) operate in complex environments systems with integrated physical and computational capabilities. Wi....
Release Date 2022/05 -
Cyber Security and Digital Forensics
Author Mangesh M. Ghonge , Sabyasachi Pramanik , Ramchandra Mangrulkar , Dac-Nhuong Le
CYBER SECURITY AND DIGITAL FORENSICSCyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.Cur....
Release Date 2022/03 -
SCSP SNIA Certified Storage Professional All-in-One Exam Guide (Exam S10-110)
Author Eric Vanderburg
This effective self-study guide offers 100% coverage of the challenging SCSP SNIA Certified Storage Professional examGet complete coverage of all the SCSP exam objectives inside this comprehensive resource. Written by Eric Vanderburg, a leading expert on storage cer....
Release Date 2017/03 -
Author Jeff Bollinger , Brandon Enright , Matthew Valites
This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy,....
Release Date 2015/05 -
Professional Penetration Testing
Author Thomas Wilhelm
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability iden....
Release Date 2015/08 -
Cost Management and Control in Government
Author Dale Geiger
Government organizations spend enormous amounts of money. They employ a large percentage of the work force. They have an undeniably huge impact on the national economy and wealth. Yet they are, for the most part, unmanaged. What passes for management is a combinat....
Release Date 2011/06 -
Author Khosro S. Jahdi , Tom Cockburn
Evolving stories of governance and change are being written into the emerging custom and practice of all kinds of organizations today, whether they are global or domestic, startup or blue chip, corporate or government agency. Changing ways of ‘doing business’ are no....
Release Date 2015/01 -
Author Frank Rubin
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: ....
Release Date 2022/08 -
Kali Linux Wireless Penetration Testing : Beginner's Guide
Author Vivek Ramachandran , Cameron Buchanan
Master wireless testing techniques to survey and attack wireless networks with Kali LinuxIn DetailAs wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The K....
Release Date 2015/03 -
Human Rights, Democracy and Governance
Author ActionAid Asia ActionAid International Asia
Human Rights, Democracy and Governance is one of the volumes of the series titled, Imagine a New South Asia, presented by ActionAid International Asia. This volume emphasizes on unity in South Asia based on liberty and fraternity. It acknowledges that the countries ....
Release Date 2010/01 -
Author Hendrik Ebbers
Design and Deploy High-Performance JavaFX Controls Deliver state-of-the-art applications with visually stunning UIs. Mastering JavaFX 8 Controls provides clear instructions, detailed examples, and ready-to-use code samples. Find out how to work with the latest Java....
Release Date 2014/06 -
The Lazy Fundamental Analyst: Applying quantitative techniques to fundamental stock analysis
Author Fred Piard
A simple, quick and effective approach to quantitative fundamental analysis The Lazy Fundamental Analyst presents a collection of strategies based on the application of quantitative analysis to fundamentals-based investing. It will appeal to anyone looking for....
Release Date 2014/10 -
The Manager's Pocket Guide to Diversity Management
Author Dr. Edward E. Hubbard
This pocket guide will teach you the skills required to effectively manage a diverse workplace—not because it's the "right thing to do" or your organization requires it, but because it is good for business. Gain diversity awareness, tools, knowledge and techniques ....
Release Date 2004/01 -
Wireless Security Architecture
Author Jennifer Minella , Stephen Orr
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutionsWireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrast....
Release Date 2022/04