-
The Practitioner's Guide to POLCA
Author Rajan Suri
POLCA (Paired-cell Overlapping Loops of Cards with Authorization) is a card-based visual control system that manages the flow of jobs through the shop floor: at each operation, it controls which job should be worked on next to meet delivery targets. POLCA ensures t....
Release Date 2018/04 -
Network Security Through Data Analysis
Author Michael S Collins
In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided i....
Release Date 2014/02 -
Author Le Nguyen Binh
With coherent mixing in the optical domain and processing in the digital domain, advanced receiving techniques employing ultra-high speed sampling rates have progressed tremendously over the last few years. These advances have brought coherent reception systems for ....
Release Date 2017/07 -
Author Lawrence E. Hughes
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required backgrou....
Release Date 2022/03 -
The Appropriations Law Answer Book
Author William G. Arnold
Avoid Violations of the Antideficiency Act!Antideficiency Act (ADA) violations within both the financial and audit communities are now at an all-time high. Violations often result from a lack of knowledge about what is and what is not permissible under the law....
Release Date 2012/02 -
Author Eric Seagren
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get thi....
Release Date 2011/04 -
Security Architect: Careers in information security
Author Jon Collins
Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies. They ensure ....
Release Date 2014/09 -
Author Massimo Bertaccini
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and....
Release Date 2022/03 -
Mastering Windows Security and Hardening - Second Edition
Author Mark Dunkerley , Matt Tumbarello
A comprehensive guide to administering and protecting the latest Windows 11 and Windows server operating system from ongoing cyber threats using zero-trust security principlesKey FeaturesLearn to protect your Windows environment using zero-trust and a multi-layered security approachImplement securit....
Release Date 2022/08 -
Author Andrea Simmons
Understand the role of Information Security ManagersYour responsibilities as an information security manager are critical. Advising on protecting the organisation's assets, security and data systems, not to mention its reputation, are in your hands. A major securit....
Release Date 2012/08 -
Author Janos Gyerik
Primarily written for those who are new to version control systems, this easy-to-follow guide to Bazaar will quickly make you an expert. From basic principles to creating plugins – it’s all here.Gain an understanding of what version control is, and how you can benef....
Release Date 2013/06 -
Computer Forensics InfoSec Pro Guide
Author David Cowen
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Infor....
Release Date 2013/03 -
Stability and Control of Large-Scale Dynamical Systems
Author Sergey G. Nersesov , Wassim M. Haddad
Modern complex large-scale dynamical systems exist in virtually every aspect of science and engineering, and are associated with a wide variety of physical, technological, environmental, and social phenomena, including aerospace, power, communications, and network s....
Release Date 2011/11 -
Unmanned Aerial Vehicles: Embedded Control
Author Rogelio Lozano
This book presents the basic tools required to obtain the dynamical models for aerial vehicles (in the Newtonian or Lagrangian approach). Several control laws are presented for mini-helicopters, quadrotors, mini-blimps, flapping-wing aerial vehicles, planes, etc. Fi....
Release Date 2010/03 -
The Antivirus Hacker's Handbook
Author Elias Bachaalany , Joxean Koret
Hack your antivirus software to stamp out future vulnerabilitiesThe Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future ....
Release Date 2015/09 -
Under Control: Governance Across the Enterprise
Author Jacob Lamm
Under Control captures decades of business governance experience from many of the leading authorities at CA, Inc. This book sets out not only to explain the essential challenges of effective business governance, but to help you build solutions for your organization ....
Release Date 2009/12 -
Information Security Governance Simplified
Author Todd Fitzgerald
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how....
Release Date 2016/04 -
Check Point NGX R65 Security Administration
Author Ralph Bonnell
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and ....
Release Date 2011/08 -
Author Melissa M. Stone , Terri D. Barreiro
This book provides a guided deep dive into the early stages of venture development of social entrepreneurship. It introduces concepts that provide important insights necessary for social venture success. It introduces a set of entrepreneurial tools designed for the ....
Release Date 2013/08 -
Mastering Wireless Penetration Testing for Highly Secured Environments
Author Aaron Johns
Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionalsIn DetailPenetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By ....
Release Date 2015/01 -
Agile Model-Based Systems Engineering Cookbook
Discover recipes for addressing the growing complexity of modern systems by applying agile methodologies and techniques in model-based systems engineering (MBSE)Key FeaturesLearn how Agile and MBSE can work iteratively and collaborate to overcome system complexityDevelop essential systems engineerin.... -
Fire Your Stock Analyst! Analyzing Stocks on Your Own
Author Harry Domash
In Fire Your Stock Analyst!, San Francisco Chronicle investment columnist Harry Domash presents a start-to-finish approach to stock selection that draws on winning techniques from the world's top money managers, uses readily available information, and is easy to im....
Release Date 2002/09 -
Cisco Network Design Solutions for Small-Medium Businesses
Author Peter Rybaczyk
Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM.Design and implement effective network solutions by mastering the design proces....
Release Date 2004/08 -
Being a Solo Librarian in Healthcare
Author Elizabeth C Burns
This book brings to light the current job responsibilities of the healthcare librarian, but at the same time reveals a dichotomy. In theory, advances in healthcare research promise better care and improved safety for patients. In practice, there are barriers that un....
Release Date 2015/05 -
Author Mary M. Somerville
By fostering principles of systems thinking and informed learning though an inclusive, participatory design process that advances information exchange, reflective dialogue, and knowledge creation, the Informed Systems Approach promotes conceptual change in workplace....
Release Date 2015/07 -
Intelligent Coatings for Corrosion Control
Author James Rawlins , Lloyd Hihara , Atul Tiwari
Intelligent Coatings for Corrosion Control covers the most current and comprehensive information on the emerging field of intelligent coatings. The book begins with a fundamental discussion of corrosion and corrosion protection through coatings, setting the stage fo....
Release Date 2014/10 -
Author Josh Pauli
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system....
Release Date 2013/06 -
Thinking Security: Stopping Next Year’s Hackers
Author Steven M. Bellovin
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re a....
Release Date 2015/11 -
Protecting Your Company's Intellectual Property
Author Deborah E. Bouchoux
A company’s most valuable assets may not be physical. This book shows how to protect them without fences or security guards! You can’t touch it or feel it. Sometimes you can’t even see it. Yet, intellectual property continues to soar in value, comprising an increas....
Release Date 2006/02 -
Author Joy R. Butler
If you actively use the internet to advance your business and professional endeavors, you are a cyber citizen and this book is for you. As a good cyber citizen, you want to stay legal online and protect your online interests. The Cyber Citizen’s Guide Th....
Release Date 2010/05